Chapter 5 & 6

1234567891011121314151617181920
Across
  1. 1. An acronym for entities which validate identities and issue digital certificates to clients
  2. 4. A method of encryption which uses two keys, a public and private key
  3. 8. An acronym for a security protocol that provides encryption, authentication and data integrity and provides an additional layer of security
  4. 10. Malicious software that replicates by inserting a copy of itself into a file of data
  5. 11. The data before encryption
  6. 15. A program or hardware device that filters the incoming information from the internet into a private network or computer system
  7. 16. The creator sends out a legitimate looking email, when the recipient clicks on a link in the email, the user is sent to a fake website in an attempt to gain their confidential data
  8. 18. Converting data/plaintext into code/ciphertext
  9. 19. Unsolicited emails containing advertising material sent to a distribution list
  10. 20. A type of system that perform frequent checks to see if a monitored value falls within acceptable limits
Down
  1. 1. The result of applying an encryption algorithm to data
  2. 2. A type of malware that spreads copies of itself from computer to computer
  3. 3. Malicious code installed on a user’s hard drive or on the web server, the code will redirect the user to a fake website without their knowledge in an attempt to gain their confidential data
  4. 5. An acronym for a type of protocol which allows data to be sent and received securely over the internet by encrypting data
  5. 6. Encryption which uses the same key to encode and decode the data
  6. 7. A key shared to all the people who the user will be communicating
  7. 9. A piece of software that records user actions without the user’s knowledge
  8. 12. A hardware device that receives a signal from a computer and adjusts the setting of a controlling device
  9. 13. A continuous process where a measurement is taken then where needed, a control action is initiated
  10. 14. A hardware device that measures a property and transmits a value to a controlling computer
  11. 16. To process the incoming data and decide if the user needs to be alerted
  12. 17. A key owned only by the user