Across
- 2. Standard for information security management systems.
- 7. Malware that demands payment to restore access.
- 8. Strategies to prevent data loss or misuse.
- 9. Secret key used for decryption in asymmetric encryption.
- 10. Process of converting data into a fixed-size string of characters for integrity verification.
- 11. Device that monitors and controls network traffic.
- 12. Testing to identify vulnerabilities in a system.
- 14. To verify the identity of a user or system.
- 15. Reverse process of converting ciphertext back to plaintext.
- 16. Protocol ensuring secure communications over networks.
- 17. Centralized unit managing security operations.
- 18. Security mechanism requiring multiple forms of verification.
Down
- 1. Assurance that one cannot deny the validity of their actions.
- 3. Key used in asymmetric encryption, shared publicly.
- 4. Decentralized ledger technology for secure transactions.
- 5. A weakness in a system that can be exploited.
- 6. Handling cryptographic keys throughout their lifecycle.
- 13. Process of converting plaintext into ciphertext.
