Across
- 2. process of applying a mathematical algorithm to data to produce an alphanumeric value to be used as a representative of that data
- 4. allowing only authorized accesses for users that are necessary to accomplish assigned tasks
- 5. process of monitoring the events occurring in an information system/network and analyzing them for signs of possible incidents and attempting to stop detected possible incidents
- 7. form of cryptology that applies a cryptographic operation to provide confidentiality of information
- 8. process of monitoring the events occurring in an information system/network and analyzing them for signs of possible incidents
- 9. a physical room, building, or facility housing IT infrastructure
- 10. device for the express purpose of transmitting and receiving documents from a like device or over a telephone line
Down
- 1. dividing resources of a computer into multiple execution environments
- 3. process of applying a non-secret value to data prior to applying a cryptographic process
- 6. technical means of access to systems or applications
