8 Cybersecurity & Global Impacts

123456789101112
Across
  1. 3. includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
  2. 4. software intended to damage a computing system or to take partial control over its operation
  3. 6. a process of encoding messages to keep them secret, so only "authorized" parties can read it.
  4. 8. information about an individual that identifies, links, relates, or describes them.
  5. 10. a process that reverses encryption, taking a secret message and reproducing the original plain text.
  6. 11. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  7. 12. a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
Down
  1. 1. pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
  2. 2. protects a computing system against infection
  3. 5. a wireless access point that gives unauthorized access to secure networks.
  4. 7. a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
  5. 9. involves one key for both encryption and decryption.