Cybersecurity Fundamentals Chapter 5
Across
- 3. an efficient way to store, retrieve, and analyze data.
- 4. table relationship must remain consistent.
- 7. a set of rules defined by the user which does not belong to one of the other categories.
- 9. use to make hashing more secure.
- 11. strengthens hashing algorithm by using additional secret key as input to the hash function.
- 12. a tool that ensures data integrity by taking binary data and producing a fixed-length. representation call the hash value.
- 13. checks that data falls within the parameters defined by the database designer.
- 14. all data stored in a column must follow the same format.
- 16. hashing algorithm developed by ron rivest that produces a 128-bit hash value.
Down
- 1. refers to the accuracy, consistency, and reliability of data stored in a
- 2. developed by the us national institute of standards and technology (nist) and can be implemented in different strengths.
- 5. the policies, roles, and procedures required to create, manage, distribute, use, store, and revoke digital certificate.
- 6. provide the same functionality as handwritten signature for electronics documents.
- 8. all rows must have a unique identifier called primary key.
- 10. equivalent to an electronic passport.
- 15. standard for the construction of digital certificate and public key infrastructure (pki) used to manage digital certificate.