Information Security

123456789
Across
  1. 3. The assurance that the information is trustworthy and accurate
  2. 4. A guarantee of reliable access to the information by authorized people.
  3. 6. A network communication endpoint
  4. 8. A form of Encryption where keys come in pairs.
  5. 9. A set of rules that limits access to information
Down
  1. 1. The process of encoding information in such a way that only authorized parties can access it
  2. 2. An encryption methodology that uses a single key to encrypt and decrypt data.
  3. 5. The process of determining whether someone or something is, in fact, who or what it declares
  4. 6. A standard set of rules that allow electronic devices to communicate with each other.
  5. 7. The process of securing a system by reducing its surface of vulnerability