Across
- 2. pairs a public key for encryption and a private key for decryption
- 5. software intended to damage a computing system or to take partial control over its operation
- 7. a malicious program that can copy itself and gain access to a computer in an unauthorized way
- 9. encryption involves one key for both encryption and decryption
- 10. a technique that attempts to trick a user into providing personal information
- 11. infomration about an individual that identifies, links, relates or describes them
Down
- 1. a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentification mechanism
- 3. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- 4. the process of decoding data
- 6. the process of encoding data to prevent unauthorized access
- 8. a wireless access point that give unauthorized access to to secure networks