Across
- 1. DDOS attack is done with the help of this machine
- 4. Before accessing a website we should make sure it contains this certificate.
- 5. This invites threats to the computer
- 7. This is an attack on availability
- 10. This is one of the goal of the security, which prevents withholding of information
- 11. DOS attack can be done with the help of this command
- 12. This is an act that takes on false identity
Down
- 2. This attack repeat some action of the benefit of the attacker.
- 3. Total guard against loss of information
- 6. This is an attack on confidentiality
- 8. This is one of the goal of security, which prevents modification of in formation.
- 9. The method of creating a counterfeit objects on a computing system
