1 16
2 18
3
4
5 19
6/15
8 7 17
9
10
11
12
13
14

Crossword: Network validation & authentication

Across

1. A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.

2. In asymmetric encryption, a key that is publicly available and used for encryption.

3. A cryptographic system that uses the same key for both encryption and decryption.

4. In asymmetric encryption, a key that is kept secret and used for decryption.

5. An electronic document that confirms the credibility of a sender or receiver in a network communication.

6. The process of invalidating a digital certificate before its expiration date.

7. A network security device that employs predetermined security rules to filter and regulate incoming and outgoing network traffic.

8. A pair of cryptographic keys, consisting of a public key and a private key.

9. The process of verifying that a network operates efficiently and satisfies the intended performance standards.

10. A fraudulent attempt to obtain sensitive information, such as passwords, by disguising as a trustworthy entity.

11. The process of verifying the identity of a user by requiring them to provide a password.

12. It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.

13. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.

14. A piece of information used to authenticate a user's identity, such as a password or biometric data.

Down

15. Information used to authenticate a user's identity, typically consisting of a username and password.

16. The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements.

17. The act of confirming the identity of a user or device, with the purpose of granting access to a network or system.

18. The process of converting ciphertext into plaintext using a decryption algorithm and a key.

19. The process of securely exchanging keys between parties in asymmetric encryption.


🖶

Shortcuts

Left: ⇤ Right: ⇥ Up: ↑ Down: ↓