CSP Unit 4

12345678910111213141516171819202122232425262728293031323334353637
Across
  1. 4. Encryption process that uses 2 different keys for encoding and decoding data
  2. 6. A cipher in which each letter in an alphabet is replaced with a different character or symbol
  3. 7. Added to code to see what values are being set on variables while code is running
  4. 8. Helps programmers figure out what code is supposed to do
  5. 9. Encryption process that uses related private key and public key for encryption/decryption
  6. 10. Adding an extra layer of security by requiring a user to provide two different types of identifying information
  7. 11. Type of wireless access point that gives unauthorized access to secure networks
  8. 14. Input used to verify a program runs correcty
  9. 15. Information about letters that can help you break a simple substitution cipher
  10. 18. An encryption machine used during World War II by Germany and Italy to encrypt and protect transmitted messages
  11. 19. Decoding encrypted data to make it human-readable
  12. 20. tricking someone into sharing sensitive information with a fraudulent e-mail
  13. 21. Encoding data to prevent unauthorized access, such as converting plaintext to ciphertext
  14. 24. Manually checking a program by recording variable values and changes line by line
  15. 25. System of rules and specifications that standardizes communication and interoperability between computers
  16. 27. A string of characters used as a parameter that determines the output of an encryption algorithm
  17. 28. Sensitive or identifying info. about a person, e.g. social security number, age, financial info
  18. 29. data such as fingerprint record or retinal scan
  19. 32. Records every keystroke to gain fraudulent access to passwords / confidential information
  20. 33. An attempt to discover information, especially passwords, by trying many possibilities, hoping one of the guesses is correct
  21. 35. An example of public key encryption algorithm
  22. 36. Software intended to damage or take partial control over a computing system
  23. 37. To give permission to access information
Down
  1. 1. A digital document used to verify the authenticity of a server or public key.
  2. 2. A designated stopping place in the code used by debuggers
  3. 3. Confirming your identity using knowledge known only to you
  4. 4. A way of allowing programmers to write code that interacts with a system, e.g., by providing function/method headers, access to them, documentation how to use them
  5. 5. An organization that verifies a public key is owned by the entity named on the certificate
  6. 12. A mistake in the program that occurs during the execution of a program
  7. 13. Person responsible for managing computers, networks, servers, and other computing resources
  8. 16. The science and art of delivering a message securely and confidentially
  9. 17. Global network comprised of many smaller networks operating with standardized communication rules
  10. 22. Result of trying to handle data that is outside of the defined range of values
  11. 23. When code compiles and runs, but produces unexpected/undesirable behavior/results
  12. 26. small, text-based bits of information that a web server saves and accesses
  13. 30. Tool provided by IDE that helps with error finding
  14. 31. unauthorized access of protected data
  15. 34. Encryption process that uses a single key for encoding and decoding data