Linux Security

12345678910111213141516171819202122
Across
  1. 1. Battery device that provides backup power.
  2. 2. Test to tell computers and humans apart.
  3. 4. Triad of Confidentiality, Integrity, and Accessibility.
  4. 5. Secure remote login protocol on port 22.
  5. 7. File where changing a UID to 0 creates a backdoor.
  6. 10. Weak hash algorithm that is vulnerable to collisions.
  7. 11. Tool used to monitor file integrity.
  8. 12. Famous 2010 malicious worm discussed in class.
  9. 13. Attack that disrupts service using botnets.
  10. 14. Following an authorized person through a secure door.
  11. 17. Malware that hides by replacing commands like ls.
  12. 19. Ticket-based authentication system from MIT.
  13. 20. Phil Zimmerman's email security tool.
  14. 21. Default logging service in Linux.
  15. 22. Encryption using the same key for sender and receiver.
Down
  1. 1. Pseudo-device driver used to generate random numbers.
  2. 3. Encryption using a public and private key pair.
  3. 4. Command used to age passwords.
  4. 6. The modern successor to the SSL protocol.
  5. 8. Group famous for penetration testing methods.
  6. 9. Hiding a secret message inside an image file.
  7. 15. Packet filtering firewall on Linux.
  8. 16. When two different inputs make the exact same hash value.
  9. 18. Employee who is a security threat.