G3 Icebreaker

12345
Across
  1. 3. is the process of verifying a user's identity to grant access to a system or resource
  2. 5. is a software that manages and handles hardware and software resources of a computing device.
Down
  1. 1. 2nd OS security model discussed
  2. 2. is the process of converting data into a form that cannot be read without a decryption key
  3. 4. a person who utilizes a computer or network service