Internet Security

12345678910
Across
  1. 5. A technique for examining the contents of packets on a network and rejecting them if they do not form a part of a recognised communication.
  2. 7. A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a certification Authority.
  3. 8. Where a public and private key are used to encrypt and decrypt data.
  4. 9. Where the sender and receiver both use the same key to encrypt and decrypt data.
  5. 10. Key A code used to encrypt/decrypt data that can be made public and is linked to a corresponding private key.
Down
  1. 1. A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules.
  2. 2. A method of ensuring that an encrypted message is from a trusted source as they have a unique, encrypted signature verified by a Certification Authority.
  3. 3. A trusted organisation that provides digital certificates and signatures
  4. 4. Hardware and software for protecting against unauthorised access to a network.
  5. 6. Key A code used to encrypt/decrypt data that is only known by one user and is linked to a corresponding public key.