Cybersecurity Fundamentals Chapter 4

1234567891011121314
Across
  1. 2. policies and procedures defined by organizations to implement and enforce all aspects of controlling authorize access.
  2. 3. fundamental component of ipsec virtual private networks (vpn).
  3. 5. actual barriers deployed to prevent direct contact with systems.
  4. 8. way to store and transmit data so only the intended recipient can read or process it.
  5. 9. to encrypt and decrypt messages.
  6. 11. has a fixed block size of 128, 192 or 256 bits.
  7. 12. use one key to encrypt data and a different key to decrypt data.
  8. 13. implementing cryptography into a web browser.
  9. 14. encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits
Down
  1. 1. hardware and software solutions used to manage access resources and systems.
  2. 4. a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
  3. 6. algorithms that use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.
  4. 7. science of making and breaking secret codes.
  5. 10. uses the product of two very large prime numbers with an equal length between 100 and 200 digits.
  6. 13. a protocol that provides a secure remote access connection to network devices.