U03 CH4 Key Terms
Across
- 3. Authentication (11,14) uses at least two methods of verification. A security key fob is a good example. The two factors are something you know, such as a password, and something you have, such as a security key fob.
- 8. traces an action back to a person or process making the change to a system, collects this information, and reports the usage data.
- 9. (7,6,8) hardware and software solutions used to manage access to resources and systems. These technology-based solutions include tools and protocols that computer systems use for identification, authentication, authorization, and accountability.
- 12. (4,11) is the use and practice of making the message confusing, ambiguous, or harder to understand.
- 13. (8,6,8) actual barriers deployed to prevent direct contact with systems. The goal is to prevent unauthorized users from gaining physical access to facilities, equipment, and other organizational assets.
- 14. conceals data (the message) in another file such as a graphic, audio, or other text file. The advantage over cryptography is that the secret message does not attract any special attention.
- 15. methods include Passwords, passphrases, or PINs. Smart cards and security key fobs. A unique physical characteristic, biometrics.
Down
- 1. (10, 9) encryption algorithms use one key to encrypt data and a different key to decrypt data. One key is public and the other is private.
- 2. (4,3,4) Passwords, passphrases, or PINs are all examples
- 4. (4,3,4) Smart cards and security key fobs are both examples
- 5. (3,3,3) A unique physical characteristic, such as a fingerprint, retina, or voice, that identifies a specific user is called biometrics.
- 6. controls what a user can and cannot do on the network after successful authentication.
- 7. (9,9) use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data. Both the sender and receiver know the pre-shared key before any encrypted communication begins.
- 10. Technologies primarily based on maths and computer science for protecting information so that it is only accessible to authorised recipients.
- 11. replaces data with authentic looking values to apply anonymity to the data records.