IT Terms #1

12345678910
Across
  1. 2. process of applying a mathematical algorithm to data to produce an alphanumeric value to be used as a representative of that data
  2. 4. allowing only authorized accesses for users that are necessary to accomplish assigned tasks
  3. 5. process of monitoring the events occurring in an information system/network and analyzing them for signs of possible incidents and attempting to stop detected possible incidents
  4. 7. form of cryptology that applies a cryptographic operation to provide confidentiality of information
  5. 8. process of monitoring the events occurring in an information system/network and analyzing them for signs of possible incidents
  6. 9. a physical room, building, or facility housing IT infrastructure
  7. 10. device for the express purpose of transmitting and receiving documents from a like device or over a telephone line
Down
  1. 1. dividing resources of a computer into multiple execution environments
  2. 3. process of applying a non-secret value to data prior to applying a cryptographic process
  3. 6. technical means of access to systems or applications