CIS 115: E-Commerce Security and Payment Systems

12345678910111213141516171819202122
Across
  1. 1. ______ key: In asymmetric encryption, an unpublished key used to decrypt messages that were encrypted with a public key.
  2. 4. Occurs when hackers attempt to hide their true identities by using fake email addresses or masquerading as someone else.
  3. 8. A security method that makes information unreadable to anyone who doesn't have a key to decipher it.
  4. 11. Ensures that e-commerce participants do not deny their online actions.
  5. 13. ______-______ attack: A hacking method used to find passwords or encryption keys by trying every possible combination of characters until the correct one is found.
  6. 14. Software that collects information about your computer and how you use it and relays that information to someone else over the Internet.
  7. 16. Ensures the information displayed or sent has not been altered in any way by an unauthorized party.
  8. 18. Determines whether a Web site is accessible and operational at any given moment.
  9. 21. _______ horse: A malicious program disguised as legitimate software.
  10. 22. An attack on a computer or network in which bandwidth is flooded or resources are overloaded.
Down
  1. 2. Malicious software created by a hacker to restrict access to the computer system that it infects and demand a ransom paid to the creator of the malicious software for the restriction to be removed.
  2. 3. ______ key encryption. An encryption method using a public key to encrypt messages and a corresponding private key to decrypt them.
  3. 5. ___________ authority: In public key cryptography, a trusted third party who authenticates entities and their public keys.
  4. 6. An overlooked or hidden entry into a computer system.
  5. 7. A computer overtaken by a hacker and used to perform malicious tasks.
  6. 9. An attempt to mislead people into divulging confidential information.
  7. 10. An exploitable defect in a software application or operating system that allows hackers to crash systems or use systems for their own purposes.
  8. 12. An attempt to defraud Internet surfers by hijacking a website's domain name and redirecting users to an imposter website.
  9. 14. ___________ key encryption: An encryption method using the same secret key to encrypt and decrypt messages.
  10. 15. An often malicious program that can copy and propagate itself over the Internet using email programs or other transport tools.
  11. 17. A hardware or software device that controls network access and communications between a network and the Internet.
  12. 19. A program that can self-replicate and infect files and computer systems.
  13. 20. A group of computers that have been compromised and brought under the control of an individual.