Across |
2. | unsolicited emails |
5. | identifies a special category of information that requires protection |
6. | uses the DNS to look up a name |
10. | a standardized network protocol used on Internet Protocol networks. |
12. | returns basic information stored about the domain |
15. | a way of generating a random internal key whenever there is a file encryption (2 Words) |
16. | a three-part protocol that errors and session shutdown are shown |
18. | wireless encryption that has an 24-bit initialization vector |
19. | the developer of the XOR operation (2 Words) |
22. | a TCP/IP attack that sends lots of SYN packets to produce "half open connection" (2 Words) |
23. | a result of plaintext encryption using the cipher algorithm |
24. | a key distribution strategy that has one per endpoint pair |
26. | a WPA 2 wireless encryption that creates new encryption keys each time users log on to the network with their unique passwords |
27. | the center that distributes wrapped keys |
30. | a type of cryptography that uses two different keys |
33. | a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption. |
34. | helps remote access users connect to a variety of network resources through a public data network |
35. | a multilevel security challenge where it is hard to remove all sensitive data from the document |
36. | example of these are spies or agents |
37. | something that is in a TCP packet (2 Words) |
40. | an authentication server used by WPA 2 enterprise |
42. | wireless encryption that is backward compatible with WEP |
43. | process of establishing permission for someone |
44. | is the process of securing data transmissions from being infiltrated, exploited or intercepted by an individual, application or device |
45. | a system software for creating and managing databases |