Across
- 4. This decides what areas of the network you can access. For example, you have full access to your home drive (documents area), but you can only read some documents on the classwork area. There are some drives you can't even see (3 words)
- 5. The method for encrypting the plaintext (2 words)
- 7. Provides extra security for the word or term used to log on. Some companies insist this word must include letters, number, symbols and be at least 8 characters long (2 words)
- 8. A network security device that monitors incoming and outgoing network traffic and decides whether to allow it or block it (1 word)
- 9. A sequence of numbers used to encrypt or decrypt, often using a mathematical formula (1 word)
- 10. The encrypted message (1 word)
- 11. The original message to be encrypted (1 word)
Down
- 1. A way of identifying if the user trying to access the system is genuine and authorised
- 2. A method to determine which devices are allowed to access the network (1 word)
- 3. The process of converting cyphertext into plaintext (1 word)
- 6. The process of converting plaintext into ciphertext (1 word)
