Information Security
Across
- 2. A form of Encryption where keys come in pairs.
- 4. The process of encoding information in such a way that only authorized parties can access it
- 6. A guarantee of reliable access to the information by authorized people.
- 7. A standard set of rules that allow electronic devices to communicate with each other.
- 8. A set of rules that limits access to information
- 9. The process of securing a system by reducing its surface of vulnerability
Down
- 1. An encryption methodology that uses a single key to encrypt and decrypt data.
- 2. The process of determining whether someone or something is, in fact, who or what it declares
- 3. The assurance that the information is trustworthy and accurate
- 5. A network communication endpoint