SECURITY

12345678910
Across
  1. 1. A fixed-size output derived from variable-sized input, used to verify data integrity.
  2. 3. Property ensuring data is not altered or tampered with.
  3. 4. Malware that encrypts data and demands payment for decryption.
  4. 7. Process of converting plaintext into ciphertext.
  5. 8. Device/software that filters data packets to secure a network.
  6. 10. Cipher where letters are replaced by others.
Down
  1. 2. Encryption method using two keys, public and private.
  2. 5. Ensuring that information is accessible only to authorized individuals.
  3. 6. Art of breaking encryption and analyzing vulnerabilities.
  4. 9. Fraudulent attempt to obtain sensitive information via fake emails.