Across
- 1. An acronym for entities which validate identities and issue digital certificates to clients
- 4. A method of encryption which uses two keys, a public and private key
- 8. An acronym for a security protocol that provides encryption, authentication and data integrity and provides an additional layer of security
- 10. Malicious software that replicates by inserting a copy of itself into a file of data
- 11. The data before encryption
- 15. A program or hardware device that filters the incoming information from the internet into a private network or computer system
- 16. The creator sends out a legitimate looking email, when the recipient clicks on a link in the email, the user is sent to a fake website in an attempt to gain their confidential data
- 18. Converting data/plaintext into code/ciphertext
- 19. Unsolicited emails containing advertising material sent to a distribution list
- 20. A type of system that perform frequent checks to see if a monitored value falls within acceptable limits
Down
- 1. The result of applying an encryption algorithm to data
- 2. A type of malware that spreads copies of itself from computer to computer
- 3. Malicious code installed on a user’s hard drive or on the web server, the code will redirect the user to a fake website without their knowledge in an attempt to gain their confidential data
- 5. An acronym for a type of protocol which allows data to be sent and received securely over the internet by encrypting data
- 6. Encryption which uses the same key to encode and decode the data
- 7. A key shared to all the people who the user will be communicating
- 9. A piece of software that records user actions without the user’s knowledge
- 12. A hardware device that receives a signal from a computer and adjusts the setting of a controlling device
- 13. A continuous process where a measurement is taken then where needed, a control action is initiated
- 14. A hardware device that measures a property and transmits a value to a controlling computer
- 16. To process the incoming data and decide if the user needs to be alerted
- 17. A key owned only by the user