Across
- 2. Filters traffic on a network
- 3. Linux tool to encrypt and decrypt
- 8. Encryption that only uses a public and private key
- 11. A way of accessing a system remotely
- 12. Linux command to search a file for a string
- 13. I in CIA
- 14. Tricks people into making themselves vulnerable
Down
- 1. Stores files in itself
- 4. Physical, Technical, Procedural and Legal controls that can be applied; second framework concept
- 5. Ethical hacking
- 6. Use of shifting characters to hide a message
- 7. Keeping information offsite for easy recovery
- 9. Malicious software
- 10. File that contains information about previous interactions with a system or network