UNIT-I

1234567891011
Across
  1. 6. Establish proof of identity
  2. 8. field of both cryptography and cryptanalysis
  3. 10. study of encryption principles/methods
  4. 11. Attack on Authenticity
Down
  1. 1. The assurance that data received are exactly same as sent by an authorized entity
  2. 2. Who can access what
  3. 3. Who attempt to penetrate systems
  4. 4. A person attempts to violate security
  5. 5. DOS stands for
  6. 7. an intelligent act that is a deliberate attempt
  7. 9. a possible danger