CrytoMaze 3
Across
- 8. Replacing sensitive data with non-sensitive equivalents.
- 9. Faking the origin of a message or communication to deceive the recipient.
- 10. Measures taken to protect information from unauthorized access or damage.
- 12. Malicious software that replicates itself to spread to other systems.
- 13. Digital document used to verify identities in secure communications.
- 14. An incident where unauthorized access to data occurs.
- 16. To convert information into a secure format.
- 18. A method of bypassing normal authentication or security controls.
Down
- 1. Entity that issues digital certificates in a PKI.
- 2. The discovery and interpretation of meaningful patterns in data, often used for security monitoring.
- 3. Process of identifying and evaluating risks to information assets.
- 4. An isolated environment for safely executing untested code.
- 5. A piece of software or code that takes advantage of a vulnerability.
- 6. Ensuring data consistency across multiple systems.
- 7. Set of rules governing data communication.
- 11. Secure area within a system for processing sensitive data.
- 15. To convert encrypted data back to its original form.
- 17. Fraudulent attempt to obtain sensitive information by deception.