Cybersecurity Fundamentals Chapter 4
Across
- 2. policies and procedures defined by organizations to implement and enforce all aspects of controlling authorize access.
- 3. fundamental component of ipsec virtual private networks (vpn).
- 5. actual barriers deployed to prevent direct contact with systems.
- 8. way to store and transmit data so only the intended recipient can read or process it.
- 9. to encrypt and decrypt messages.
- 11. has a fixed block size of 128, 192 or 256 bits.
- 12. use one key to encrypt data and a different key to decrypt data.
- 13. implementing cryptography into a web browser.
- 14. encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits
Down
- 1. hardware and software solutions used to manage access resources and systems.
- 4. a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
- 6. algorithms that use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.
- 7. science of making and breaking secret codes.
- 10. uses the product of two very large prime numbers with an equal length between 100 and 200 digits.
- 13. a protocol that provides a secure remote access connection to network devices.