hostage exploit until payment
ransomware
network level protection against unauthorized access
firewall
denial-free proof of origin or delivery
nonrepudiation
scramble data into a code that requires right key to interpret
encrypt
specilaized format most suited for transmission or storage
encoding
security measure against bots
captcha
symmetric block cipher
AES
public key encryption
RSA
grant or deny access to resource
authorization
validate credentials
authetication
improves password strength or nonpredictability
entropy
protection of classified information
confidentiality
chronological record used as documentary evidence to trace sequence of activities
audit trail
acquire sensitive information by masquerading as a trustworthy entity
phishing
information collected about a remote computing device for the purpose of identification
fingerprinting

Preview of Crossword

Make this Crossword your own

Add, edit, delete clues, and customize this crossword. Print copies for an entire class. All in 5 minutes.

Icon crossword    Create my Crossword now    

Your customized Crossword will be in your hands in five minutes.

Related Puzzles

Compliance Crossword Puzzle

38 terms
Created on Feb 15, 2016

ITGS Ch. 10

17 terms
Created on Feb 26, 2016

Cyber Security

15 terms
Created on Mar 23, 2016

Digital Technology

15 terms
Created on Mar 23, 2016

Daliy Buisness Terms

24 terms
Created on Apr 14, 2016

Cyber Security

20 terms
Created on Apr 25, 2016

will

20 terms
Created on Jun 13, 2016

OnGuardians

15 terms
Created on Jun 16, 2016

Technology Crossword Puzzle

15 terms
Created on Aug 4, 2016

Technology

26 terms
Created on Aug 12, 2016

Glossary Crossword

10 terms
Created on Sep 2, 2016

Music Biz Unit2

22 terms
Created on Sep 26, 2016

Mr. Baugh

19 terms
Created on Sep 30, 2016

ISO17025

27 terms
Created on Oct 26, 2016

E-Safety

20 terms
Created on Nov 15, 2016

Do you have what it 'techs'?

20 terms
Created on Dec 1, 2016

The Cox Auto Team Member Handbook

30 terms
Created on Jan 4, 2017

AP Government Vocabulary - Skylar Carr

47 terms
Created on Jan 5, 2017

Trend Micro

10 terms
Created on Jan 30, 2017

Chapter seven -Health information Functions

22 terms
Created on Feb 15, 2017