ESLA Cybersecurity NATHAN COMPAGNON

12345678910111213
Across
  1. 5. an information object (like a word) that points to related information that is located elsewhere and can be retrieved by activating the link.
  2. 7. It's an ICMP message sent to determine if the machine you sent it too is online and how long traffic is.
  3. 8. it's a challenge-response test commonly used by websites to verify the user is a real human
  4. 10. range of frenquencies used to transmit a signal.
  5. 13. It's the process of taking off one layer of headers and passing the rest of the packet up to the next higher layer on the protocol stack.
Down
  1. 1. it's a kind of spyware software that records every keystroke made on a computer’s keyboard
  2. 2. Discreet access placed illicitly in a system or software, making it possible to bypass legitimate access control
  3. 3. Broadcasting from one host to a given set of hosts.
  4. 4. A program which is often started at the time the system boots and runs continuously without intervention from users on the system.
  5. 6. it's an elementary building block of a digital circuit.
  6. 9. Software making revenues by displaying ads in webpages
  7. 11. An algorithm that uses cryptography it include encryption, cryptographic, digital signature and key agreement algorithms.
  8. 12. An attack that sends an improperly large ping with the intent of overflowing the input buffers and causing it to crash.