Across
- 2. front-facing software vulnerable to malicious actors
- 4. hiding data in a large media file
- 6. system in which data is written to a file instead of being written directly to the file system to minimize the chance of file corruption
- 11. a software update meant to fix security issues
- 13. value used in hashing to reduce collisions
- 14. data about file data
- 15. malware that affected an Iranian nuclear power facility in 2010
- 17. a large kernel that runs all its modules in kernel space
- 19. a user with elevated privileges within the system
- 21. one of the greatest and most unpredictable treats to a network system
- 23. essential to have in case of system failure, damage, sabotage, etc.
- 24. defense in _____: having multiple layers of security
Down
- 1. command to safely detach an external file system
- 3. automated test used to verify human users and detect bots
- 5. security measure meant to filter network traffic
- 7. security that is inconspicuous
- 8. using an algorithm and key to hide data from outside parties
- 9. authentication methods such as fingerprints, iris scans, and face recognition
- 10. command used to safely edit the etc/sudoers file
- 12. file containing usernames and hashes of their passwords
- 16. devices that can be attached or removed without rebooting the system
- 18. not telling malicious actors what kinds of security measures are in place
- 20. value used to determine the permissions of a newly-created file or directory
- 22. data structure that contains information about a file or directory, including the location of its contents
