Down 1.A string of characters used to prove an individual's identity to a system or object 2.Making data appear to have originated from another so urce so as to hide the true origin from the recipient 3.The temporary storage of information before use, typically used to speed up systems 4.A type of attack that overwhelms a server or network with more traffic than it can handle, resulting in the system crashing 5.A hidden method used to gain access to a computer system, network, or hidden application 6.The process by which a subject's (or a user's) identify if verified 9.The art of secret writing that enables someone to hide the contents of a message or file from everyone but the person received 10.A coding system that converts messages into ciphertext using its algorithm and key 12.A network device used to segregate traffic based on rules 14.一种将自己附加到其他代码以复制的恶意软件或软件的形式