Project Three Part Two
Across
- 2. Cyber ___ refers to fundamental cybersecurity best practices that an organization's security practitioners and users can undertake.
- 4. a kind of bullying or harassment that takes place via the internet.
- 5. The skill of writing and solving codes, or the study of codes.
- 7. a structure or scheme consisting of a set of algorithms that converts plaintext to the ciphertext to encode or decode messages securely.
- 8. cryptography is the study of ___ communications mechanisms that restrict access to a message's contents to just the sender and intended receiver.
- 10. a digital certificate is a ___ or electronic password that uses cryptography and the public key infrastructure to authenticate the validity of a device, server, or user.digital Certificate
Down
- 1. Cyberstalking is the use of the ____ or other electronic means to stalk or harass an individual, group, or organization.
- 3. the technique of defending vital systems and sensitive data against cyber-attacks.
- 6. any hostile operation aimed at computer information systems, computer networks, infrastructures, or personal computers.
- 9. A person in an existing photograph or video is replaced with someone else's likeness in synthetic media.