Across
- 5. Sender’s public key that has been digitally signed by trusted third parties
- 6. Controls that ensure that only authorized personnel have access to the firm’s assets
- 8. Software and hardware that provide a focal point for security by channeling all network connections through a control gateway
- 9. Encryption that uses three different keys to encrypt the message three times
Down
- 1. A computer’s control program
- 2. Listing of transactions that provides an audit trail of all processed events
- 3. Firewall that examines the source and destination addresses attached to incoming message packets
- 4. Hardware component that asks the caller to enter a password and then breaks the connection to perform a security check
- 7. Uses the logs and backup files to restart the system after a failure
