Across
- 2. a hardware device that provides emergency power and allows systems to shut down gracefully during failures
- 5. an authentication system developed a MIT that uses "tickets" to guarantee identities
- 8. the method of hiding data within another medium, like an image or audio file, to conceal its existence
- 9. a cryptographic failure where two different inputs generate the same hash output
- 13. a security system that requires multiple forms of identification factors to gain access to an account
- 14. a network of compromised computers, often including IoT devices, infected with malware
- 17. the systematic process of securing a Linux system by reducing its attack surface by disabling unnecessary services
- 20. a process that generates a fixed-length string of characters from a variable-length input
- 21. malicious software that provides unauthorized administrative-level access to a computer while remaining undetected.
- 22. public-key cryptography that utilizes a shared public key and a secret private key to guarantee the identities of users and services
Down
- 1. a command-line firewall utility that acts as a packet filtering system.
- 3. the file or medium used in steganography to hold a hidden payload
- 4. a cyberattack where scammers impersonate organization or individuals to steal sensitive information
- 6. a malicious computer worm that targeted Iran's nuclear program in 2010
- 7. a public turing test used to verify that a web user is a human rather than a spambot
- 10. a type of encryption that utilizes a singular shared key for both encryption and decryption
- 11. in steganography, this refers to information that has to be concealed and transmitted
- 12. the Linux command used to manage password expiration and aging
- 15. a cryptographic network protocol used for secure remote login and command execution
- 16. a network-level security system that prevents unwanted packets from accessing network and systems
- 18. a security measure that uses unique physical traits, such as fingerprints or retinas, for authentication
- 19. a cryptographic method used for securing email through encryption and digital signatures
