Across
- 3. is the process of verifying a user's identity to grant access to a system or resource
- 5. is a software that manages and handles hardware and software resources of a computing device.
Down
- 1. 2nd OS security model discussed
- 2. is the process of converting data into a form that cannot be read without a decryption key
- 4. a person who utilizes a computer or network service
