Across
- 1. A computer attack aimed at making a service unavailable.
- 3. A brand that makes cybersecurity devices especially for companies.
- 5. A program/device that protects a network.
- 7. A technique for protecting data by transforming it irreversibly.
- 8. A technique used by fraudsters to obtain personal information with the aim of committing identity theft.
- 9. A network of computers infected by malware that are under the control of a single attacking party.
Down
- 2. A technique of symmetric encryption.
- 4. A hashing algorithm which is the most used in secret-keys transfert.
- 6. A known certfication authority who offers free certificates.