Cybersecurity Fundamentals Chapter 5

12345678910111213141516
Across
  1. 3. an efficient way to store, retrieve, and analyze data.
  2. 4. table relationship must remain consistent.
  3. 7. a set of rules defined by the user which does not belong to one of the other categories.
  4. 9. use to make hashing more secure.
  5. 11. strengthens hashing algorithm by using additional secret key as input to the hash function.
  6. 12. a tool that ensures data integrity by taking binary data and producing a fixed-length. representation call the hash value.
  7. 13. checks that data falls within the parameters defined by the database designer.
  8. 14. all data stored in a column must follow the same format.
  9. 16. hashing algorithm developed by ron rivest that produces a 128-bit hash value.
Down
  1. 1. refers to the accuracy, consistency, and reliability of data stored in a
  2. 2. developed by the us national institute of standards and technology (nist) and can be implemented in different strengths.
  3. 5. the policies, roles, and procedures required to create, manage, distribute, use, store, and revoke digital certificate.
  4. 6. provide the same functionality as handwritten signature for electronics documents.
  5. 8. all rows must have a unique identifier called primary key.
  6. 10. equivalent to an electronic passport.
  7. 15. standard for the construction of digital certificate and public key infrastructure (pki) used to manage digital certificate.