Security

123456789
Across
  1. 1. Control mechanism preventing unauthorized use.
  2. 3. Infrastructure binding public keys to identities.
  3. 5. Process of converting plaintext into ciphertext.
  4. 7. C in the CIA triad; keeping information secret
  5. 8. One-way function producing a fixed-size output.
  6. 9. A in the CIA triad; keeping resources accessible.
Down
  1. 1. Verifying the claimed identity of a user or system.
  2. 2. Digital proof of authenticity and integrity.
  3. 4. Secret input required for encryption or decryption.
  4. 6. I in the CIA triad; keeping information unaltered.