Across
- 2. Involves one key for both encryption and decryption
- 6. Information about an individual that identifies, links, relates, or describes them
- 8. Something physical or non-physical that includes a program as an integral part of its function
- 9. The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- 10. A process of encoding messages to keep them secret, so only "authorized" parties can read it
- 11. A wireless access point that gives unauthorized access to secure networks
Down
- 1. A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
- 3. a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are)
- 4. Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message
- 5. A process that reverses encryption, taking a secret message and reproducing the original plain text
- 7. Software intended to damage a computing system or to take partial control over its operation
