Across
- 3. A type of cyber attack where individuals are manipulated into revealing sensitive information.
- 6. A trial and error method used to decode encrypted data such as passwords.
- 10. An unauthorized wireless access point that allows unauthorized users to connect to a secure network.
- 11. The action of tracking and recording keys struck on a keyboard, typically in a covert manner.
- 12. The practice and study of techniques for secure communication, often involving encryption and decryption.
- 14. A type of computation in which many calculations or processes are carried out simultaneously.
- 16. Refers to the gap between people who have access to modern information and communication technology and those who do not.
- 18. A process that converts input data into a fixed-size string of bytes, often used for data integrity verification.
- 19. The practice of concealing messages or data within other non-secret text or data.
- 20. The process of verifying the identity of a user or system.
- 21. A type of encryption where the same key is used for both encryption and decryption.
Down
- 1. A cryptographic key that can be freely distributed and used to encrypt messages.
- 2. A networking device that forwards data packets between computer networks.
- 4. A global network of interconnected computers that communicate with each other using a common set of protocols.
- 5. A cyber attack that disrupts normal traffic of a targeted server.
- 7. The inclusion of extra components in a system to improve reliability and performance.
- 8. A set of rules that govern the exchange of data between devices.
- 9. The process of encoding information in such a way that only authorized parties can access it.
- 13. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- 15. A public-key encryption algorithm used for secure data transmission over the internet.
- 17. Small units of data that are transmitted over a network.