Cybersecurity Fundamentals Chapter 4
Across
- 1. Also known as public-key encryption, it uses a pair of keys – a public key for encryption and a private key for decryption.
- 3. The study of analyzing information systems to understand hidden aspects of the systems.
- 4. The science of encrypting and decrypting information to protect data confidentiality.
- 6. The process of converting plaintext into ciphertext to prevent unauthorized access.
- 7. The process of managing cryptographic keys in a cryptosystem, including their generation, exchange, storage, use, and destruction.
- 8. A type of encryption where the same key is used for both encryption and decryption.
Down
- 1. Techniques used to regulate who can view or use resources in a computing environment.
- 2. The practice of deliberately creating misleading or confusing information to hide the true meaning of the data.
- 4. An algorithm used to perform encryption or decryption.
- 5. The reverse process of encryption, where ciphertext is converted back into readable plaintext using a key.