Cyber Security 2 Chapter 4
Across
- 3. The 'I' in the CIA Triad, ensuring that data is not altered or destroyed in an unauthorized manner.
- 4. A software update that fixes a vulnerability.
- 5. An algorithm used to encrypt and decrypt data.
- 9. The raw text or data before it is encrypted.
- 10. The art of writing and solving codes.
- 11. The standard for secure, encrypted communication on the internet, replacing SSL. (abbreviation)
- 14. A file maintained by a server that contains information about all the activities that have occurred on that server.
- 16. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
- 18. Software that secretly monitors a user's online activity.
- 19. A secret key used in cryptography.
- 20. A flaw or weakness in a program.
- 21. A network that uses public telecommunication infrastructure, such as the internet, to provide remote offices with secure access to their organization's network (abbreviation).
- 22. A network of connected devices within a specific geographic area. (abbreviation)
- 23. The process of converting encrypted data back into its original, readable form.
Down
- 1. The result of encrypting plaintext.
- 2. A small program that can be embedded in a website or document.
- 6. A program that replicates itself over a network.
- 7. A type of malicious software that collects information about a person or organization without their knowledge.
- 8. A mathematical scheme for demonstrating the authenticity of a digital message or document. (2 words)
- 12. A technique used by attackers to make their network traffic look like it came from a legitimate source.
- 13. A digital document used to prove the ownership of a public key. (2 words)
- 15. The main circuit board of the computer.
- 17. A physical object, such as a token or smart card, used to authenticate a user.