Cyber Security

12345
Across
  1. 3. an algorithm for transforming original message to coded message
  2. 5. is the process of verifying the identity of a person or device
Down
  1. 1. is the method by which information is converted into secret code that hides the information's true meaning.
  2. 2. it is the defense of digital information and IT assets against internal and external, malicious and accidental threats
  3. 4. study of encryption principles
  4. 5. an attempt to expose, alter, disable, destroy, steal or gain information through unauthorized access to or make unauthorized use of an asset.