CrytoMaze 3

123456789101112131415161718
Across
  1. 8. Replacing sensitive data with non-sensitive equivalents.
  2. 9. Faking the origin of a message or communication to deceive the recipient.
  3. 10. Measures taken to protect information from unauthorized access or damage.
  4. 12. Malicious software that replicates itself to spread to other systems.
  5. 13. Digital document used to verify identities in secure communications.
  6. 14. An incident where unauthorized access to data occurs.
  7. 16. To convert information into a secure format.
  8. 18. A method of bypassing normal authentication or security controls.
Down
  1. 1. Entity that issues digital certificates in a PKI.
  2. 2. The discovery and interpretation of meaningful patterns in data, often used for security monitoring.
  3. 3. Process of identifying and evaluating risks to information assets.
  4. 4. An isolated environment for safely executing untested code.
  5. 5. A piece of software or code that takes advantage of a vulnerability.
  6. 6. Ensuring data consistency across multiple systems.
  7. 7. Set of rules governing data communication.
  8. 11. Secure area within a system for processing sensitive data.
  9. 15. To convert encrypted data back to its original form.
  10. 17. Fraudulent attempt to obtain sensitive information by deception.