1 16
17
2/3
15
18
4
5
6
7
8
9
10
11
12
13
14

Crossword: Network validation & authentication

Across

1. It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.

2. The act of confirming the identity of a user or device, with the purpose of granting access to a network or system.

3. A piece of information used to authenticate a user's identity, such as a password or biometric data.

4. In asymmetric encryption, a key that is kept secret and used for decryption.

5. Information used to authenticate a user's identity, typically consisting of a username and password.

6. The process of converting plaintext into ciphertext using an encryption algorithm and a key.

7. A fraudulent attempt to obtain sensitive information, such as passwords, by disguising as a trustworthy entity.

8. In asymmetric encryption, a key that is publicly available and used for encryption.

9. A network security device that employs predetermined security rules to filter and regulate incoming and outgoing network traffic.

10. An electronic document that confirms the credibility of a sender or receiver in a network communication.

11. The process of converting a password into a fixed-length string of characters using a cryptographic algorithm.

12. The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements.

13. The process of invalidating a digital certificate before its expiration date.

14. The process of verifying the identity of a user by requiring them to provide a password.

Down

15. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.

16. The process of verifying that a network operates efficiently and satisfies the intended performance standards.

17. Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication.

18. The process of securely exchanging keys between parties in asymmetric encryption.


🖶

Shortcuts

Left: ⇤ Right: ⇥ Up: ↑ Down: ↓