Across
- 4. A process for reducing the number of bits needed to represent something in which some information is lost or thrown away. This process is not reversible.
- 6. Data about data.
- 9. Protects a computing system against infection.
- 12. used to return the flow of control to the point where the procedure (also known as a function) was called and to return the value of expression.
- 15. A technique for encryption that shifts the alphabet by some number of characters.
- 18. A group of interconnected computing devices capable of sending or receiving data.
- 19. A process of encoding messages to keep them secret, so only "authorized" parties can read it.
- 21. Any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
- 22. A written description of how a command or piece of code works or was developed.
- 23. A process that reverses encryption, taking a secret message and reproducing the original plain text.
- 24. A wireless access point that gives unauthorized access to secure networks.
- 25. A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
Down
- 1. Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message.
- 2. A method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security.
- 3. The system responsible for translating domain names like example.com into IP addresses
- 5. Software intended to damage a computing system or to take partial control over its operation
- 7. The generic term for a technique (or algorithm) that performs encryption
- 8. The single unit of information in a computer, typically represented as a 0 or 1
- 10. Information about an individual that identifies, links, relates, or describes them.
- 11. Involves one key for both encryption and decryption.
- 13. A variable in a function definition. Used as a placeholder for values that will be passed through the function.
- 14. The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- 16. A group of computing devices and programs working together for a common purpose
- 17. A protocol for computers to request and share the pages that make up the world wide web on the Internet
- 20. When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption.
