CLIL Module Exercise (Line A)

1234567891011
Across
  1. 4. set of steps to follow to modify the message according to the rules defined
  2. 5. When the DoS attack is not coming from a single host
  3. 6. on purpose
  4. 8. Who applies digital signature
  5. 10. Kind of attacks performed to discover and map system vulnerabilities
  6. 11. Traditional signature
Down
  1. 1. The key used by the sender in order to ensure authentication
  2. 2. Who is responsible for certification, validation and revocation of certificates
  3. 3. it is not realistic to reconstruct the input given the output without spending great amounts of computing time.
  4. 7. Property ensured by the digital signature
  5. 9. Something that has no sense