Cybersecurity Principles
Across
- 3. This principle is the assurance that the data, transactions, communications or documents (electronic or physical) are genuine.
- 5. This principle is achieved through cryptographic methods which prevents a person or entity from denying having performed a particular action related to data for proof of obligation, intent, or commitment; or for proof of ownership.
Down
- 1. This principle is the assurance of timely and reliable access to data services for authorized users. It ensures that information or resources are accessible when required.
- 2. This principle covers the assurance of data privacy. Only the intended and authorized recipients: people, processes or devices, may read the data. Disclosure to unauthorized entities, such as using unauthorized network sniffing is a confidentiality violation.
- 4. This principle provides an assurance of data non-alteration. This is having assurance that the information has not been altered in transmission, from origin to reception. This principle is compromised when information is corrupted or altered, willfully or accidentally, before it is read by its intended recipient.