Across
- 3. Pretty Good Privacy encryption tool (abbr.)
- 5. Command to change password aging information
- 7. Virtual Private Network (abbr.)
- 11. Malicious software that remains hidden in the system
- 12. Secure Hash Algorithm family (abbr.)
- 14. MIT authentication system that uses tickets
- 15. Command to run programs with elevated privileges
- 16. Hash function vulnerable to collisions (abbr.)
- 17. Secure remote login protocol on port 22 (abbr.)
- 18. Successor to SSL for secure communications (abbr.)
- 19. Boot loader that can be password protected
Down
- 1. Multi-layer security strategy (defense in depth)
- 2. Turing test to distinguish humans from computers
- 4. Multi-_____ authentication (6 letters)
- 6. Linux packet filtering firewall tool
- 8. File /etc/______ that stores user account information
- 9. Pseudo-device driver for generating random numbers
- 10. Security triad; Confidentiality, Integrity, Availability (abbr.)
- 13. Advanced Encryption Standard (abbr.)
- 17. Centralized logging daemon
