Luke Nick and Harry

12345678910111213141516
Across
  1. 6. The original form of a message
  2. 7. The receptiveness and convenience of data
  3. 8. A process of encryption named after a Roman Emperor
  4. 10. A measure put in place to minimize threats
  5. 11. Software that takes advantage of a flaw
  6. 13. Fraudulent practice of getting personal information
  7. 15. Files that have changed since last backup
  8. 16. Preliminary experimentation on a system
Down
  1. 1. Identifying and analyzing flaws
  2. 2. Encryption that uses the same key
  3. 3. Exposed to the possibility of an attack
  4. 4. Magic happens after this process of plaintext
  5. 5. Guessing all combinations until correct
  6. 9. Restoring data
  7. 12. A digital authentication of dependability: can verify authenticity.
  8. 14. Simulating a potential cyber-barrage