Internet Security

12345678910
Across
  1. 6. Where the sender and receiver both use the same key to encrypt and decrypt data.
  2. 8. A trusted organisation that provides digital certificates and signatures
  3. 9. A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules.
  4. 10. A code used to encrypt/decrypt data that can be made public and is linked to a corresponding private key.
Down
  1. 1. Where a public and private key are used to encrypt and decrypt data.
  2. 2. A technique for examining the contents of packets on a network and rejecting them if they do not form a part of a recognised communication.
  3. 3. A code used to encrypt/decrypt data that is only known by one user and is linked to a corresponding public key.
  4. 4. A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a certification Authority.
  5. 5. A method of ensuring that an encrypted message is from a trusted source as they have a unique, encrypted signature verified by a Certification Authority.
  6. 7. Hardware and software for protecting against unauthorised access to a network.