Across
- 2. practice of intentionally and ethically hacking into systems to discover vulnerabilities
- 3. cryptographic protocol providing secure key exchange over an untrusted network, often used in VPNs
- 5. security model emphasizing the importance of confidentiality, integrity, and availability of information
- 7. type of attack involves capturing and analyzing network traffic to obtain sensitive information
- 9. attack that employs multiple methods simultaneously
- 11. type of malware changes its appearance and characteristics to evade detection
Down
- 1. process of hiding information within another file or message
- 4. cybersecurity principle ensuring that data is accurate, complete, and unaltered
- 6. practice of disguising data traffic to make it look like normal traffic
- 7. Linux user's favorite game
- 8. cryptographic process verifying the integrity of data and ensures it has not been altered during transmission
- 10. type of malware disguises itself as legitimate software to trick users into installing it