Across
- 1. Control mechanism preventing unauthorized use.
- 3. Infrastructure binding public keys to identities.
- 5. Process of converting plaintext into ciphertext.
- 7. C in the CIA triad; keeping information secret
- 8. One-way function producing a fixed-size output.
- 9. A in the CIA triad; keeping resources accessible.
Down
- 1. Verifying the claimed identity of a user or system.
- 2. Digital proof of authenticity and integrity.
- 4. Secret input required for encryption or decryption.
- 6. I in the CIA triad; keeping information unaltered.
