Lesson 8

12345678910111213141516171819202122
Across
  1. 4. A protocol based on SSL 3.0 that provides authentication and encryption, used by most servers for secure exchanges over the Internet.
  2. 7. A malicious program that replicates itself on computer systems, usually through executable software, and causes irreparable system damage.
  3. 8. Programming code that provides a temporary solution to a known problem, or bug.
  4. 9. A password-protected, encrypted data file containing message encryption, user identification and message text. Used to authenticate a program or a sender's public key, or to initiate SSL sessions. Must be signed by a certificate authority(CA)to be valid.
  5. 11. A self-replicating program or algorithm that consumes system resources.
  6. 13. A security barrier that controls the flow of information between the Internet and a private network. A firewall prevents outsiders from accessing an enterprise's internal network, which accesses the Internet indirectly through a proxy server.
  7. 15. The unethical practice of registering domain names very similar to those of high-volume sites in hopes of receiving traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in their browsers.
  8. 16. A software application secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes.
  9. 17. The process of converting encrypted data back to its original form
  10. 18. Software that scans disks and programs for known viruses and eliminates them.
  11. 20. The security principle of providing proof that a transaction occurred between identified parties. Repudiation occurs when one party in a transaction denies that the transaction took place.
  12. 21. A variable value, such as a numeric code, that uses an algorithm to encrypt and decrypt data. Some applications encrypt and decrypt with the same key, whereas other applications use a pair of keys.
  13. 22. An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time of the signature
Down
  1. 1. A program disguised as a harmless application that actually produces harmful results.
  2. 2. A file or collection of tools that resolves system liabilities and improves software performance.
  3. 3. An encryption method in which the same key in used to encrypt and decrypt a message. Also known as a private-key encryption.
  4. 5. An application that installs hidden services on systems. Illicit servers consist of "client" code and "server" code that enable the attacker to monitor and control the operation of the computer infected with the server code.
  5. 6. The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data.
  6. 10. A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.
  7. 12. Abbreviation for malicious software. Malware is software designed to harm computer systems.
  8. 14. An encryption method in which two keys (a private key and a public key) are used to encrypt and decrypt a message. Also known as public-key encryption.
  9. 19. A graphic or moving image that appears on your screen when your computer is idle.