Across
- 3. A digitally signed document that binds an entity’s identity to its public key
- 6. A unique, single-use value that ensures fresh cryptographic operations
- 7. The process of converting ciphertext into plaintext
- 8. Steps taken to lessen the impact or likelihood of a security threat
- 10. A guarantee that a party cannot deny the validity of their digital action or message
Down
- 1. A deceptive tactic that induces individuals into revealing sensitive information
- 2. A cryptographic marker that verifies the authenticity and integrity of a digital document
- 4. A technique or tool that leverages a vulnerability to perform unauthorized actions
- 5. A security approach that assumes no user or device is inherently safe
- 9. Assurance that data remains unaltered from its original state
