Crossword 6
Across
- 7. decodes information encoded with its associated public key, encrypting information that can be decrypted only by its associated key
- 8. ensures that the sender cannot deny sending a message
- 10. the range of valid keys used by an algorithm
- 12. process of converting ciphertext back into plain text
- 14. the ability of a product or services to provide adequate performance across changes in size, load, scope, or volume
- 16. a set of rules and procedures usually mathematical in nature
- 18. a communication pathway, circuit, or frequency dedicated or reserved for a specific transmission
- 19. the standards body for Internet-related engineering specifications
Down
- 1. any product that appears in a vendor’s PowerPoint slide deck, but is not yet available in its products
- 2. triggering the generation of a new symmetric encryption key and secure exchange of that key
- 3. seemingly random and unusable output from a cryptographic function applied to original data
- 4. this occurs when a dataset is too large for maximum supported size of a communication container, such as a segment, packet, or frame
- 5. removal of redundant or superfluous data or space to reduce the size of the data
- 6. art and science of hiding information from unauthorized third parties
- 9. a common protocol used in establishing direct connection between two networking nodes
- 11. the ability for a network or system to remain unknown
- 13. process where malicious code can enter from a non-secure network and make a sharp turn into a secure network
- 14. (SSH) network protocol that allows data exchange using a secure channel between two networking devices.
- 15. usually a dedicated line between network locations or to the Internet
- 17. the process of verifying data integrity