U03 CH4 Key Terms

123456789101112131415
Across
  1. 3. Authentication (11,14) uses at least two methods of verification. A security key fob is a good example. The two factors are something you know, such as a password, and something you have, such as a security key fob.
  2. 8. traces an action back to a person or process making the change to a system, collects this information, and reports the usage data.
  3. 9. (7,6,8) hardware and software solutions used to manage access to resources and systems. These technology-based solutions include tools and protocols that computer systems use for identification, authentication, authorization, and accountability.
  4. 12. (4,11) is the use and practice of making the message confusing, ambiguous, or harder to understand.
  5. 13. (8,6,8) actual barriers deployed to prevent direct contact with systems. The goal is to prevent unauthorized users from gaining physical access to facilities, equipment, and other organizational assets.
  6. 14. conceals data (the message) in another file such as a graphic, audio, or other text file. The advantage over cryptography is that the secret message does not attract any special attention.
  7. 15. methods include Passwords, passphrases, or PINs. Smart cards and security key fobs. A unique physical characteristic, biometrics.
Down
  1. 1. (10, 9) encryption algorithms use one key to encrypt data and a different key to decrypt data. One key is public and the other is private.
  2. 2. (4,3,4) Passwords, passphrases, or PINs are all examples
  3. 4. (4,3,4) Smart cards and security key fobs are both examples
  4. 5. (3,3,3) A unique physical characteristic, such as a fingerprint, retina, or voice, that identifies a specific user is called biometrics.
  5. 6. controls what a user can and cannot do on the network after successful authentication.
  6. 7. (9,9) use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data. Both the sender and receiver know the pre-shared key before any encrypted communication begins.
  7. 10. Technologies primarily based on maths and computer science for protecting information so that it is only accessible to authorised recipients.
  8. 11. replaces data with authentic looking values to apply anonymity to the data records.