Across
- 6. Where the sender and receiver both use the same key to encrypt and decrypt data.
- 8. A trusted organisation that provides digital certificates and signatures
- 9. A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules.
- 10. A code used to encrypt/decrypt data that can be made public and is linked to a corresponding private key.
Down
- 1. Where a public and private key are used to encrypt and decrypt data.
- 2. A technique for examining the contents of packets on a network and rejecting them if they do not form a part of a recognised communication.
- 3. A code used to encrypt/decrypt data that is only known by one user and is linked to a corresponding public key.
- 4. A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a certification Authority.
- 5. A method of ensuring that an encrypted message is from a trusted source as they have a unique, encrypted signature verified by a Certification Authority.
- 7. Hardware and software for protecting against unauthorised access to a network.
