Group Activity
Across
- 1. limited access of any resources
- 6. encrypted messages
- 9. example of integrity
- 10. example of integrity
Down
- 2. It involves a range of technologies, processes and practices designed to safeguard the CIA of information
- 3. data at-rest
- 4. Component of cybersecurity
- 5. combination of date and time
- 7. reading by authorized parties
- 8. authorized parties are able to modify