Cybersecurity Last Test Vocab Review

12345678910111213141516
Across
  1. 3. A cipher in which an encryption key, such as a word or phrase, is chosen and used to index to a row in the table. Each letter of the key indicates which row to use. To encrypt a message, you find the original letter in the appropriate row and use the letter at the top of the table as the encrypted character.
  2. 4. ____ key encryption. A type of private key encryption is an encryption method where the sender and receiver share a single private key (such as a number, word, or phrase) to use in the encryption algorithm.
  3. 6. The original message that needs to be encrypted
  4. 11. The science and art of delivering a message securely and confidentially.
  5. 12. ____ key encryption Also known as public key encryption; an encryption method that uses two keys, a public key available to everyone and a private key belonging to one owner. The keys are combined mathematically to create one key used in the encryption/decryption algorithm
  6. 13. this part of the CIA triad involves maintaining the consistency, accuracy and trustworthiness of data over its entire lifecycle. Data must not be changed in transit, and steps must be taken to ensure data cannot be altered by unauthorized people.
  7. 14. the practice of concealing messages within other data, such as text or images.
  8. 15. The encrypted message generated by a cipher
  9. 16. A file that contains other data and acts like a drive. It can be mounted (connected to) or unmounted (removed from) a drive letter, giving administrators greater control when making the data available to users.
Down
  1. 1. ____ Watermarking. Authors or creators of works may embed some code or a signature to be used to verify where the work came from and who the owner is.
  2. 2. ____ Steganography replaces redundant or insignificant data with covert data. LSB substitution is an example of this, where that last bit in a byte is used to encode information. An example of this would be reserving the last bit in each byte that represents a 24-bit pixel of an image to encode 3 bits worth of information.
  3. 5. this part of the CIA triad is roughly equivalent to privacy. This measures are designed to prevent sensitive information from unauthorized access attempts. It is common for data to be categorized according to the amount and type of damage that could be done if it fell into the wrong hands. More or less stringent measures can then be implemented according to those categories.
  4. 7. In hash functions, the same message always results in the same hash.
  5. 8. this part of the CIA triad means information should be consistently and readily accessible for authorized parties.
  6. 9. ____ function A computational process that converts data of varying size to a fixed-size. The data is converted using a one-way function so the process cannot be reversed.
  7. 10. an algorithm used for encryption or decryption