Home
My Puzzles
FAQ
Report bug
Collected Puzzles
User listed puzzles
Random Puzzle
Log In/Out

Chapter 13: Not All Is as It Seems

Brett Muldrow

Key Terms for Digital Signatures

1
 
 
  2
3    
     
     
4                                
     
     
   
   
   
5                                                
   
6                                                    
   
    7
     
     
     
     
     
8                                
     
9                      
     
10                          
   
 
 
 
11                                

Across
4.The act of restraining users and processes so that any harm they can do is tolerable.
5.A method of regulating access to computer or network resources based on the roles of individual users within an enterprise. In this context, access is the ability of an individual user to perform a specific task, such as view, create, or modify a file.
6.One of two common methods when using a public key infrastructure for maintaining access to servers in a network that shows the list of invalid certificates and is maintained by the certificate authority that signed the certificate and distributed to all partner CAs. CRL for Short.
8.The state that exists between two interacting system entities in which neither entity can trust the other to function correctly with regard to some security requirement.
9.Pertaining to or denoting software whose source code is available free of charge to the public to use, copy, modify, sublicense, or distribute.
10.A way to guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message.
11.A mathematical technique used to validate the authenticity and integrity of a message, software or digital document. Also known as marks that a sender can make but others can easily recognize.
Down
1.Implements the principle of information hiding: only the control procedure need to know how an object is implemented.
2.A set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption. PKI for short.
3.A statement, probably written, that establishes the parameters of computing: what are the critical resources and who can access them in what ways.
7.A property that a message has not been modified while in transit (data integrity) and that the receiving party can verify the source of the message.

Use the "Printable HTML" button to get a clean page, in either HTML or PDF, that you can use your browser's print button to print. This page won't have buttons or ads, just your puzzle. The PDF format allows the web site to know how large a printer page is, and the fonts are scaled to fill the page. The PDF takes awhile to generate. Don't panic!




Google
 
Web armoredpenguin.com

Copyright information Privacy information Contact us