FOC - Unit 6 - S2 24-25

123456789101112
Across
  1. 2. software intended to damage a computing system or to take partial control over its operation
  2. 4. protects a computing system against infection
  3. 6. includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
  4. 7. a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
  5. 8. a wireless access point that gives unauthorized access to secure networks
  6. 9. a process of encoding messages to keep them secret, so only "authorized" parties can read it
  7. 10. pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
  8. 11. (PII) information about an individual that identifies, links, relates, or describes them
  9. 12. a process that reverses encryption, taking a secret message and reproducing the original plain text
Down
  1. 1. a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
  2. 3. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  3. 5. involves one key for both encryption and decryption