Across
- 6. a conventional encryption method that used a single key encryption
- 8. when information kept private and secure
- 9. the state of information while it is encrypted
- 10. the state of information before it is encrypted
- 11. the art of protecting information and information systems
- 12. provides verification of identity
Down
- 1. when systems are available to those who need them
- 2. type of attack that bad actors use to gain information commonly through emails
- 3. an encryption method that utilizes a public/private key
- 4. two words which is a form of manipulation that bad actors use to gain unauthorized access
- 5. records the identities and actives
- 7. when the data is not modified