Group Activity

12345678910
Across
  1. 1. limited access of any resources
  2. 6. encrypted messages
  3. 9. example of integrity
  4. 10. example of integrity
Down
  1. 2. It involves a range of technologies, processes and practices designed to safeguard the CIA of information
  2. 3. data at-rest
  3. 4. Component of cybersecurity
  4. 5. combination of date and time
  5. 7. reading by authorized parties
  6. 8. authorized parties are able to modify