Cybersecurity

12345678910
Across
  1. 1. A computer attack aimed at making a service unavailable.
  2. 4. A program/device that protects a network.
  3. 6. A type of malware that looks like a legimate program and is undetected by the anti-virus
  4. 7. A network of computers infected by malware that are under the control of a single attacking party.
  5. 9. A technique for protecting data by transforming it irreversibly.
Down
  1. 2. A technique of symmetric encryption.
  2. 3. A hashing algorithm which is the most used in secret-keys transfert.
  3. 5. A known certfication authority who offers free certificates.
  4. 8. A brand that makes cybersecurity devices especially for companies.
  5. 10. A technique used by fraudsters to obtain personal information with the aim of committing identity theft.