Internet Security

1234567891011121314
Across
  1. 2. Where the sender and receiver both use the same key to encrypt and decrypt data
  2. 8. Hardware or software for protecting against unauthorised access to a network
  3. 9. A technique for examining the contents of packets on a network and rejecting hem if they do not form part of a recognised communication
  4. 12. Issue solved by using public-private key encryption
  5. 13. A code used to encrypt/decrypt data that is only known by one user by is mathematically linked to a corresponding public key
  6. 14. Malware or a type of virus that replicates itself and spreads around a computer system. It does not need to be attached to another file in order to infect a computer
Down
  1. 1. Where a public and private key are used to encrypt and decrypt data
  2. 3. A trusted organisation that provides digital certificates and signatures
  3. 4. Malware that is hidden within another file on your computer
  4. 5. A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a Certification Authority
  5. 6. A generic term for malware where the program attaches itself to another file in order to infect a computer
  6. 7. A code used to encrypt/decrypt data that can be made public and is linked to a corresponding private key
  7. 10. A method of ensuring that an encrypted message is from a trusted source as they have a unique encrypted signature verified by a Certification Authority
  8. 11. A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules