Across
- 2. The operation finds the remainder of a division. For example, 5 mod 2 is 1 (5 divided by 2 has a remainder of1) and 38 mod 4 is 2 (38 divided by 4 has a remainder of 2).
- 7. It is an encryption method where the sender and receiver share a single private key (such as a number, word, or phrase) to use in the encryption algorithm. Also called shared key and symmetric key encryption, the same key is used in both the encryption and decryption process.
- 8. A cipher in which each letter in an alphabet is replaced with a different character or symbol.
- 10. It is easy to do, but hard to undo.
- 11. It is an encryption method that uses two keys, a public key available to everyone and a private key belonging to one owner. Also called asymmetric key encryption, the keys are combined mathematically to create one key used in the encryption/decryption algorithm
- 14. The encrypted message generated by a cipher
- 16. A section of a Volume that's formatted for the operating system to use as storage areas. Data used for different purposes are often stored in separate partitions, for example, operating system software versus user data.
- 21. Data that is being transferred between applications, between hosts, or around the network
- 22. A file that contains other data and acts like a drive. It can be mounted (connected to) or unmounted (removed from) a drive letter, giving administrators greater control when making the data available to users.
- 23. A string of characters used as a parameter that determines the output of an encryption algorithm.
- 24. the practice of concealing messages within other data, such as text or images.
Down
- 1. The last bit (the right-most bit) in a byte.
- 3. It is a branch of forensic science encompassing the recovery, investigation, examination, and analysis of material found in digital devices, often in relation to mobile devices and computer crime.
- 4. It is information or data that is valuable to an investigation of a crime involving a computer.
- 5. Sometimes called a logical volume or logical drive, the accessible storage area on a hard disk or disks. A logical volume can span multiple disks but doesn't have to.
- 6. Data that is stored somewhere
- 9. A digital cash system that uses cryptography to secure the exchange financial transactions.
- 12. an algorithm used for encryption or decryption
- 13. The science and art of delivering a message securely and confidentially.
- 15. Also called hashing, it is a computational process that converts data of varying size to a fixed-size. In cryptographic hash functions, the data is converted using a one-way function so the process cannot be reversed.
- 17. A standard that computers use to represent letters , numbers, and symbols. (It stands for American Standard Code for Information Interchange.)
- 18. The original message that needs to be encrypted
- 19. Data that is being manipulated by an application
- 20. The physical drives inside of a computer.