CSP Unit 8

1234567891011
Across
  1. 2. Involves one key for both encryption and decryption
  2. 6. Information about an individual that identifies, links, relates, or describes them
  3. 8. Something physical or non-physical that includes a program as an integral part of its function
  4. 9. The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  5. 10. A process of encoding messages to keep them secret, so only "authorized" parties can read it
  6. 11. A wireless access point that gives unauthorized access to secure networks
Down
  1. 1. A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
  2. 3. a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are)
  3. 4. Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message
  4. 5. A process that reverses encryption, taking a secret message and reproducing the original plain text
  5. 7. Software intended to damage a computing system or to take partial control over its operation