CyberSecurity

1234567891011
Across
  1. 2. pairs a public key for encryption and a private key for decryption
  2. 5. software intended to damage a computing system or to take partial control over its operation
  3. 7. a malicious program that can copy itself and gain access to a computer in an unauthorized way
  4. 9. encryption involves one key for both encryption and decryption
  5. 10. a technique that attempts to trick a user into providing personal information
  6. 11. infomration about an individual that identifies, links, relates or describes them
Down
  1. 1. a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentification mechanism
  2. 3. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  3. 4. the process of decoding data
  4. 6. the process of encoding data to prevent unauthorized access
  5. 8. a wireless access point that give unauthorized access to to secure networks