Internet Security
Across
- 5. A technique for examining the contents of packets on a network and rejecting them if they do not form a part of a recognised communication.
- 7. A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a certification Authority.
- 8. Where a public and private key are used to encrypt and decrypt data.
- 9. Where the sender and receiver both use the same key to encrypt and decrypt data.
- 10. Key A code used to encrypt/decrypt data that can be made public and is linked to a corresponding private key.
Down
- 1. A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules.
- 2. A method of ensuring that an encrypted message is from a trusted source as they have a unique, encrypted signature verified by a Certification Authority.
- 3. A trusted organisation that provides digital certificates and signatures
- 4. Hardware and software for protecting against unauthorised access to a network.
- 6. Key A code used to encrypt/decrypt data that is only known by one user and is linked to a corresponding public key.