Across
- 4. / This is an attack on availability
- 6. / This is an act that takes on false identity
- 7. / This is one of the goal of the security, which prevents withholding of information
- 9. / This is one of the goal of security, which prevents modification of in formation.
- 11. / This is an attack on confidentiality
- 12. / Before accessing a website we should make sure it contains this certificate.
Down
- 1. / The method of creating a counterfeit objects on a computing system
- 2. / This invites threats to the computer
- 3. / DOS attack can be done with the help of this command
- 5. / DDOS attack is done with the help of this machine
- 8. UP / Total guard against loss of information
- 10. Replay / This attack repeat some action of the benefit of the attacker.
