Across
- 6. Establish proof of identity
- 8. field of both cryptography and cryptanalysis
- 10. study of encryption principles/methods
- 11. Attack on Authenticity
Down
- 1. The assurance that data received are exactly same as sent by an authorized entity
- 2. Who can access what
- 3. Who attempt to penetrate systems
- 4. A person attempts to violate security
- 5. DOS stands for
- 7. an intelligent act that is a deliberate attempt
- 9. a possible danger
