ACC 403 Chapter 15

123456789
Across
  1. 5. Sender’s public key that has been digitally signed by trusted third parties
  2. 6. Controls that ensure that only authorized personnel have access to the firm’s assets
  3. 8. Software and hardware that provide a focal point for security by channeling all network connections through a control gateway
  4. 9. Encryption that uses three different keys to encrypt the message three times
Down
  1. 1. A computer’s control program
  2. 2. Listing of transactions that provides an audit trail of all processed events
  3. 3. Firewall that examines the source and destination addresses attached to incoming message packets
  4. 4. Hardware component that asks the caller to enter a password and then breaks the connection to perform a security check
  5. 7. Uses the logs and backup files to restart the system after a failure