Cybersecurity

12345678
Across
  1. 1. Technique of asymmetric encryption
  2. 3. Malicious program capable of replicating and spreading
  3. 6. Another protocol for securing internet communications
  4. 7. Authentication system based on something the user possesses
Down
  1. 2. Protocol for securing internet communications
  2. 4. Technique for protecting data by transforming it irreversibly
  3. 5. Type of attack that involves making a service unavailable
  4. 8. International organization establishing information security standards