Across
- 2. What tells you how to arrange the cipher's rules
- 7. Helps to verify that original author of the code is what he or she claims to be
- 8. The set of rules you are using to encode the information
- 9. A computer hosting data for others to access
- 10. A multi-step process that involves identifying a problem, isolating the source of the problem, and then either correcting the problem or determining a way to work around it
- 13. Zeroes and ones
- 16. Small chunks of data
- 17. Data compression where you lose data
Down
- 1. Analyzing the code and working back from it
- 3. An email that appears to be from an official organization, but tricks you into giving your username and password
- 4. The hierarchical addressing protocol that is human-readable
- 5. Malware that spreads itself over the network to other computers
- 6. Data about data
- 11. Timely but unreliable message delivery
- 12. Used to limit the kinds of connections outsiders can make to your computer
- 14. The "connection points" of the Internet
- 15. Attack by overloading the server with too many users
