CSP Unit 2 Crosssword Puzzle
Across
- 1. A person who is responsible for managing computers, networks, servers, and other computing resources for an organization or group.
- 6. A business or organization that issues a digital certificate verifying that a given public key is owned by the entity named on the certificate.
- 8. A single dot in an image.
- 9. Confirming your identity by using knowledge known only to you or information interpreted by you.
- 10. Small text-based bits of information about your browser that a web server saves.
- 12. A very common concept in computer science and information technology meaning that a lot of the detail of a system or a process is hidden, allowing the user to focus on the details that are important for the task at hand.
- 14. A base 2 numeral system that represents all numbers, using only the two digits 0 and 1.
- 16. The process of decoding the data, the reverse of the encryption process, making the data human-readable again.
- 18. Software intended to damage a computing system or to take partial control over its operation.
- 19. The science and art of delivering a message securely and confidentially.
- 22. A wireless access point that gives unauthorized access to secure networks.
- 27. A string of characters used as a parameter that determines the output of an encryption algorithm.
- 28. The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
Down
- 2. Also called public-key encryption, an encryption method that uses two keys, a public key and a private key, belonging to one owner.
- 3. An error that occurs when a computer attempts to handle a number that is outside of the defined range of values.
- 4. Eight bits, able to represent 256 distinct values (abbreviated “b”).
- 5. A global computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols. It relies on TCP/IP for communication between devices.
- 7. Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.
- 11. The process of encoding data to prevent unauthorized access, such as converting plaintext to ciphertext.
- 13. The unauthorized access or retrieval of confidential or otherwise protected data.
- 15. Currently the dominant method for designing human-computer interaction.
- 17. A method for determining a solution to a problem by sequentially testing all possible solutions.
- 20. An example of public key encryption developed by Rivest, Shamir, and Adelman, an American computer and network security company.
- 21. A digital document used to verify the authenticity of a server or public key.
- 23. One of the most famous ciphers in history was implemented by an encryption machine. It was used during World War II by Germany and Italy to encrypt and protect transmitted messages from the United States and the Allied powers.
- 24. Information about an individual, such as social security number, age, race, phone number(s), medical information, financial information, and biometric data such as fingerprint records and retina scans.
- 25. How information is passed through the Internet. They contain chunks of data, which are encapsulated in packets.
- 26. Also called shared key encryption, a process in which a single key is used in both the encryption and decryption algorithm to encode/decode data.