1 14 17
13 15
16
2
3
4
5
6
7
8
10 9
11
12

Crossword: Network validation & authentication

Across

1. The process of invalidating a digital certificate before its expiration date.

2. In asymmetric encryption, a key that is kept secret and used for decryption.

3. A network security device that employs predetermined security rules to filter and regulate incoming and outgoing network traffic.

4. In asymmetric encryption, a key that is publicly available and used for encryption.

5. A piece of information used to authenticate a user's identity, such as a password or biometric data.

6. The process of securely exchanging keys between parties in asymmetric encryption.

7. A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.

8. A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption.

9. The process of converting plaintext into ciphertext using an encryption algorithm and a key.

10. A cryptographic system that uses the same key for both encryption and decryption.

11. Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication.

12. An organization that issues digital certificates and verifies the authenticity of entities.

Down

13. A fraudulent attempt to obtain sensitive information, such as passwords, by disguising as a trustworthy entity.

14. The act of confirming the identity of a user or device, with the purpose of granting access to a network or system.

15. The process of converting ciphertext into plaintext using a decryption algorithm and a key.

16. The process of verifying the identity of a user by requiring them to provide a password.

17. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.


🖶

Shortcuts

Left: ⇤ Right: ⇥ Up: ↑ Down: ↓