4.1 Explain the importance of basic network security concepts

1234567891011121314151617181920212223242526272829303132333435363738
Across
  1. 1. Regulation for protecting personal data in the EU
  2. 5. Industrial devices connected to networks
  3. 6. Weakness that could be exploited
  4. 8. Physical method to secure rooms or racks
  5. 11. Review to ensure policies and controls are followed
  6. 15. Authentication that changes codes at regular intervals
  7. 18. Digital proof of identity used in secure communication
  8. 19. Single login grants access to multiple systems
  9. 20. Standard for exchanging authentication data
  10. 21. Device used for physical monitoring and security
  11. 23. Technology used to control industrial equipment
  12. 24. Standard for securing payment card information
  13. 27. Refers to data moving across a network
  14. 28. Process of verifying who a user is
  15. 29. Centralized AAA protocol for network access
  16. 30. Decoy system to attract attackers
  17. 32. Potential danger to systems or data
  18. 34. Security model of confidentiality, integrity, availability
  19. 35. Group of honeypots working together
  20. 37. Protects data by converting it into unreadable form
  21. 38. Separate network for visitors with limited access
Down
  1. 2. Assigning permissions based on a user’s job function
  2. 3. Likelihood of a threat exploiting a vulnerability
  3. 4. Restricts access based on physical location
  4. 7. Code or method used to take advantage of a weakness
  5. 9. Separating networks for security and performance
  6. 10. Determines what resources a user is allowed to access
  7. 12. Everyday smart devices connected to networks
  8. 13. System for monitoring and controlling industrial processes
  9. 14. Certificate created and trusted by its own issuer
  10. 16. Industrial control system for automation and management
  11. 17. Requirement that data stays within a certain region
  12. 22. Principle of granting minimum necessary permissions
  13. 24. Framework of CAs, certs, and keys for encryption
  14. 25. Requires two or more factors for authentication
  15. 26. System of policies and tools for identity management
  16. 31. Directory protocol often used for authentication
  17. 32. Cisco protocol for centralized authentication
  18. 33. Refers to data stored on a device or disk
  19. 36. Policy allowing employees to use personal devices