CS UNIT-1 PUZZLE
Across
- 2. A security barrier that controls network traffic.
- 3. The act of guaranteeing information is protected.
- 4. Information safe from accidental or intentional disclosure.
- 6. Exploit a vulnerability intentionally or accidentally.
- 9. The process of converting data into a secret code.
- 10. An electronic document used to prove identity online.
- 13. The process of verifying who you are.
- 15. A type of encryption using only one shared key.
Down
- 1. Gaps in a security program.
- 5. Ensuring data has not been altered or tampered with.
- 7. Information is available to authorized users when needed.
- 8. An object representing a user's security context in Windows.
- 11. Act that uses vulnerability to do damage to systems.
- 12. The process of a computer running a program's instructions.
- 14. The art and science of secret communication.