Network Security-1

123456789
Across
  1. 3. text is transformed using cipher algorithms
  2. 5. is the first computer virus identified
  3. 7. The term which denotes that only authorized users are capable of accessing the information
  4. 8. is the type of symmetric key algorithm which uses a streaming cipher to encrypt information.
  5. 9. attack refers to the denial of service attack.
Down
  1. 1. What is the CIA triad also known as?
  2. 2. Compromising confidential information falls under
  3. 3. server is used to hide malicious activity on the network
  4. 4. is used to help users detect viruses and avoid them
  5. 6. text The information that gets transformed in encryption process