Internet Security

12345678910111213
Across
  1. 1. A generic term for malware where the program attaches itself to another file in order to infect a computer
  2. 4. A method of ensuring that an encrypted message is from a trusted source as they have a unique encrypted signature verified by a Certification Authority
  3. 5. A code used to encrypt/decrypt data that is only known by one user by is mathematically linked to a corresponding public key
  4. 10. Hardware or software for protecting against unauthorised access to a network
  5. 11. A trusted organisation that provides digital certificates and signatures
  6. 12. A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a Certification Authority
  7. 13. A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules
Down
  1. 2. A technique for examining the contents of packets on a network and rejecting hem if they do not form part of a recognised communication
  2. 3. Malware or a type of virus that replicates itself and spreads around a computer system. It does not need to be attached to another file in order to infect a computer
  3. 6. Where a public and private key are used to encrypt and decrypt data
  4. 7. Where the sender and receiver both use the same key to encrypt and decrypt data
  5. 8. A code used to encrypt/decrypt data that can be made public and is linked to a corresponding private key
  6. 9. Malware that is hidden within another file on your computer