Across
- 1. Battery device that provides backup power.
- 2. Test to tell computers and humans apart.
- 4. Triad of Confidentiality, Integrity, and Accessibility.
- 5. Secure remote login protocol on port 22.
- 7. File where changing a UID to 0 creates a backdoor.
- 10. Weak hash algorithm that is vulnerable to collisions.
- 11. Tool used to monitor file integrity.
- 12. Famous 2010 malicious worm discussed in class.
- 13. Attack that disrupts service using botnets.
- 14. Following an authorized person through a secure door.
- 17. Malware that hides by replacing commands like ls.
- 19. Ticket-based authentication system from MIT.
- 20. Phil Zimmerman's email security tool.
- 21. Default logging service in Linux.
- 22. Encryption using the same key for sender and receiver.
Down
- 1. Pseudo-device driver used to generate random numbers.
- 3. Encryption using a public and private key pair.
- 4. Command used to age passwords.
- 6. The modern successor to the SSL protocol.
- 8. Group famous for penetration testing methods.
- 9. Hiding a secret message inside an image file.
- 15. Packet filtering firewall on Linux.
- 16. When two different inputs make the exact same hash value.
- 18. Employee who is a security threat.
