CryotoMaze 2

123456789101112131415161718
Across
  1. 2. Standard for information security management systems.
  2. 7. Malware that demands payment to restore access.
  3. 8. Strategies to prevent data loss or misuse.
  4. 9. Secret key used for decryption in asymmetric encryption.
  5. 10. Process of converting data into a fixed-size string of characters for integrity verification.
  6. 11. Device that monitors and controls network traffic.
  7. 12. Testing to identify vulnerabilities in a system.
  8. 14. To verify the identity of a user or system.
  9. 15. Reverse process of converting ciphertext back to plaintext.
  10. 16. Protocol ensuring secure communications over networks.
  11. 17. Centralized unit managing security operations.
  12. 18. Security mechanism requiring multiple forms of verification.
Down
  1. 1. Assurance that one cannot deny the validity of their actions.
  2. 3. Key used in asymmetric encryption, shared publicly.
  3. 4. Decentralized ledger technology for secure transactions.
  4. 5. A weakness in a system that can be exploited.
  5. 6. Handling cryptographic keys throughout their lifecycle.
  6. 13. Process of converting plaintext into ciphertext.