Security

12345678910111213141516171819
Across
  1. 3. Pretty Good Privacy encryption tool (abbr.)
  2. 5. Command to change password aging information
  3. 7. Virtual Private Network (abbr.)
  4. 11. Malicious software that remains hidden in the system
  5. 12. Secure Hash Algorithm family (abbr.)
  6. 14. MIT authentication system that uses tickets
  7. 15. Command to run programs with elevated privileges
  8. 16. Hash function vulnerable to collisions (abbr.)
  9. 17. Secure remote login protocol on port 22 (abbr.)
  10. 18. Successor to SSL for secure communications (abbr.)
  11. 19. Boot loader that can be password protected
Down
  1. 1. Multi-layer security strategy (defense in depth)
  2. 2. Turing test to distinguish humans from computers
  3. 4. Multi-_____ authentication (6 letters)
  4. 6. Linux packet filtering firewall tool
  5. 8. File /etc/______ that stores user account information
  6. 9. Pseudo-device driver for generating random numbers
  7. 10. Security triad; Confidentiality, Integrity, Availability (abbr.)
  8. 13. Advanced Encryption Standard (abbr.)
  9. 17. Centralized logging daemon