Information Security

123456789
Across
  1. 2. A form of Encryption where keys come in pairs.
  2. 4. The process of encoding information in such a way that only authorized parties can access it
  3. 6. A guarantee of reliable access to the information by authorized people.
  4. 7. A standard set of rules that allow electronic devices to communicate with each other.
  5. 8. A set of rules that limits access to information
  6. 9. The process of securing a system by reducing its surface of vulnerability
Down
  1. 1. An encryption methodology that uses a single key to encrypt and decrypt data.
  2. 2. The process of determining whether someone or something is, in fact, who or what it declares
  3. 3. The assurance that the information is trustworthy and accurate
  4. 5. A network communication endpoint