CSP Unit 4
Across
- 4. Encryption process that uses 2 different keys for encoding and decoding data
- 6. A cipher in which each letter in an alphabet is replaced with a different character or symbol
- 7. Added to code to see what values are being set on variables while code is running
- 8. Helps programmers figure out what code is supposed to do
- 9. Encryption process that uses related private key and public key for encryption/decryption
- 10. Adding an extra layer of security by requiring a user to provide two different types of identifying information
- 11. Type of wireless access point that gives unauthorized access to secure networks
- 14. Input used to verify a program runs correcty
- 15. Information about letters that can help you break a simple substitution cipher
- 18. An encryption machine used during World War II by Germany and Italy to encrypt and protect transmitted messages
- 19. Decoding encrypted data to make it human-readable
- 20. tricking someone into sharing sensitive information with a fraudulent e-mail
- 21. Encoding data to prevent unauthorized access, such as converting plaintext to ciphertext
- 24. Manually checking a program by recording variable values and changes line by line
- 25. System of rules and specifications that standardizes communication and interoperability between computers
- 27. A string of characters used as a parameter that determines the output of an encryption algorithm
- 28. Sensitive or identifying info. about a person, e.g. social security number, age, financial info
- 29. data such as fingerprint record or retinal scan
- 32. Records every keystroke to gain fraudulent access to passwords / confidential information
- 33. An attempt to discover information, especially passwords, by trying many possibilities, hoping one of the guesses is correct
- 35. An example of public key encryption algorithm
- 36. Software intended to damage or take partial control over a computing system
- 37. To give permission to access information
Down
- 1. A digital document used to verify the authenticity of a server or public key.
- 2. A designated stopping place in the code used by debuggers
- 3. Confirming your identity using knowledge known only to you
- 4. A way of allowing programmers to write code that interacts with a system, e.g., by providing function/method headers, access to them, documentation how to use them
- 5. An organization that verifies a public key is owned by the entity named on the certificate
- 12. A mistake in the program that occurs during the execution of a program
- 13. Person responsible for managing computers, networks, servers, and other computing resources
- 16. The science and art of delivering a message securely and confidentially
- 17. Global network comprised of many smaller networks operating with standardized communication rules
- 22. Result of trying to handle data that is outside of the defined range of values
- 23. When code compiles and runs, but produces unexpected/undesirable behavior/results
- 26. small, text-based bits of information that a web server saves and accesses
- 30. Tool provided by IDE that helps with error finding
- 31. unauthorized access of protected data
- 34. Encryption process that uses a single key for encoding and decoding data