CLIL Module Exercise (Line C)

12345678910
Across
  1. 5. Kind of attacks performed to discover and map system vulnerabilities
  2. 7. Something that has no sense
  3. 9. The key used by the sender in order to ensure authentication
  4. 10. When the DoS attack is not coming from a single host
Down
  1. 1. Bits added to get blocks of the same length
  2. 2. Attack name performed when attacker sends multiple SYN requests to a server
  3. 3. Traditional signature
  4. 4. Message length with a variable number of bits
  5. 6. Set of steps to follow to modify the message according to the rules defined
  6. 8. property that occurs when flipping one single bit half of the output bits flip