Cryptic Hunt Set - 1

1234567891011121314151617181920
Across
  1. 3. What term describes the process of ensuring that data transmitted across a network is secure from eavesdropping or tampering?
  2. 5. A class that allows multiple threads to read from or write to a shared resource without interference.
  3. 7. A synchronization primitive used to synchronize threads by allowing them to take turns accessing a resource.
  4. 9. In cybersecurity, what is the term for a security mechanism that monitors and controls the flow of network traffic based on predetermined rules?
  5. 11. A term used to describe the state where two or more threads are attempting to modify shared data concurrently.
  6. 12. Which technique aims to recover the original message from encrypted or encoded data without knowledge of the key?
  7. 16. Which cipher involves using a series of rotating disks or cylinders to scramble the alphabet?
  8. 17. A technique used in file systems to ensure data integrity by recording changes to disk structure before making them.
  9. 18. What type of attack floods a network with excessive traffic to overwhelm its capacity?
  10. 19. What is the name of the mathematical process used to reverse encryption?
  11. 20. A C library function used for finding the smallest integer that is greater than or equal to a floating-point number.
Down
  1. 1. What type of attack targets the domain name system to redirect users to malicious websites?
  2. 2. A technique used in file systems to delay the actual writing of data to disk until it is necessary, often to optimize disk I/O performance.
  3. 4. A tool used to automatically generate code from a given set of rules or templates.
  4. 6. An interface in the java.util.function package that represents a function that acceptstwo arguments and produces a result.
  5. 8. A type of reference in Java that prevents the referenced object from being garbagecollected until the reference itself is reachable.
  6. 10. What security measure restricts access to a network based on the physical address of a
  7. 13. In which cipher method does the key schedule determine the round keys used in the encryption algorithm?
  8. 14. Which type of attack involves capturing and analyzing network traffic to steal sensitive information, such as login credentials?
  9. 15. In which cipher does each letter in the plaintext get replaced by a corresponding letter some fixed number of positions down the alphabet?