Cyber Security 2 Chapter 4

1234567891011121314151617181920212223
Across
  1. 3. The 'I' in the CIA Triad, ensuring that data is not altered or destroyed in an unauthorized manner.
  2. 4. A software update that fixes a vulnerability.
  3. 5. An algorithm used to encrypt and decrypt data.
  4. 9. The raw text or data before it is encrypted.
  5. 10. The art of writing and solving codes.
  6. 11. The standard for secure, encrypted communication on the internet, replacing SSL. (abbreviation)
  7. 14. A file maintained by a server that contains information about all the activities that have occurred on that server.
  8. 16. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
  9. 18. Software that secretly monitors a user's online activity.
  10. 19. A secret key used in cryptography.
  11. 20. A flaw or weakness in a program.
  12. 21. A network that uses public telecommunication infrastructure, such as the internet, to provide remote offices with secure access to their organization's network (abbreviation).
  13. 22. A network of connected devices within a specific geographic area. (abbreviation)
  14. 23. The process of converting encrypted data back into its original, readable form.
Down
  1. 1. The result of encrypting plaintext.
  2. 2. A small program that can be embedded in a website or document.
  3. 6. A program that replicates itself over a network.
  4. 7. A type of malicious software that collects information about a person or organization without their knowledge.
  5. 8. A mathematical scheme for demonstrating the authenticity of a digital message or document. (2 words)
  6. 12. A technique used by attackers to make their network traffic look like it came from a legitimate source.
  7. 13. A digital document used to prove the ownership of a public key. (2 words)
  8. 15. The main circuit board of the computer.
  9. 17. A physical object, such as a token or smart card, used to authenticate a user.