Across
- 4. Hiding data inside image/audio
- 6. Uses public and private keys
- 7. Access control decided by system rules
- 9. Cloud model offering software as service
- 12. Attack that inserts malicious SQL queries
- 14. Attackthat monitors data without altering it
- 15. Original readable message
Down
- 1. Verification of user identity
- 2. Malware that locks data and demands payment
- 3. Ticket-based authentication protocol
- 5. Password attack using trash data
- 8. Caesar cipher is a type of this technique
- 10. Relationship between threat, vulnerability, and damage
- 11. Decoy system to trap attackers
- 13. System that detects intrusions
