Cybersecurity Fundamentals Chapter 4

12345678
Across
  1. 1. Also known as public-key encryption, it uses a pair of keys – a public key for encryption and a private key for decryption.
  2. 3. The study of analyzing information systems to understand hidden aspects of the systems.
  3. 4. The science of encrypting and decrypting information to protect data confidentiality.
  4. 6. The process of converting plaintext into ciphertext to prevent unauthorized access.
  5. 7. The process of managing cryptographic keys in a cryptosystem, including their generation, exchange, storage, use, and destruction.
  6. 8. A type of encryption where the same key is used for both encryption and decryption.
Down
  1. 1. Techniques used to regulate who can view or use resources in a computing environment.
  2. 2. The practice of deliberately creating misleading or confusing information to hide the true meaning of the data.
  3. 4. An algorithm used to perform encryption or decryption.
  4. 5. The reverse process of encryption, where ciphertext is converted back into readable plaintext using a key.