CSE 167

12345678910
Across
  1. 3. copies of data that can be used to replace the original
  2. 5. is a method of gaining unauthorized access to a network or computer system
  3. 9. The use of multiple layers of security techniques to help rescue the chance of successful attacks
  4. 10. in computer security is an exercises in which "flags" are security hidden in purposefully-vulnerable programs or websites
Down
  1. 1. allows you to encrypt and sign your data and communications
  2. 2. An attack that tricks people in believing they are someone else
  3. 4. Confidentiality,Integrity,Availability
  4. 6. Study of techniques for secure communication in the presenter of third parties
  5. 7. Someone that doesn't work directly under an organization but provides advice regarding cybersecurity measures for client organizations
  6. 8. attack that involves trying all possible private keys