Across
- 2. Where the sender and receiver both use the same key to encrypt and decrypt data
- 8. Hardware or software for protecting against unauthorised access to a network
- 9. A technique for examining the contents of packets on a network and rejecting hem if they do not form part of a recognised communication
- 12. Issue solved by using public-private key encryption
- 13. A code used to encrypt/decrypt data that is only known by one user by is mathematically linked to a corresponding public key
- 14. Malware or a type of virus that replicates itself and spreads around a computer system. It does not need to be attached to another file in order to infect a computer
Down
- 1. Where a public and private key are used to encrypt and decrypt data
- 3. A trusted organisation that provides digital certificates and signatures
- 4. Malware that is hidden within another file on your computer
- 5. A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a Certification Authority
- 6. A generic term for malware where the program attaches itself to another file in order to infect a computer
- 7. A code used to encrypt/decrypt data that can be made public and is linked to a corresponding private key
- 10. A method of ensuring that an encrypted message is from a trusted source as they have a unique encrypted signature verified by a Certification Authority
- 11. A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules
