chapter 8
Across
- 5. / The Trust Services Framework reliability principle that states personal information should be protected from unauthorized disclosure is known as____
- 6. / A special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization's information system, is known as a(n) _________
- 7. / If the time an attacker takes to break through the organization's preventive controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack, then security is________
- 10. /_______ specifies the structure of packets sent over the internet and the route to get them to the proper destination.(2words)
- 11. / ________ is/are an example of a preventive control.
- 12. / Restricting access of users to specific portions of the system as well as specific tasks, is an example of _________
- 13. / The Trust Services Framework reliability principle that states sensitive information be protected from unauthorized disclosure is known as ______
- 16. / The Trust Services Framework reliability principle that states access to the system and its data should be controlled and restricted to legitimate users is known as_________
Down
- 1. / the primary means of protecting data stored in a cloud from unauthorized access.
- 2. / Virtualization refers to the ability of running _____ systems simultaneously on one physical computer.
- 3. / process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as _________filtering (2words)
- 4. / _________authentication involves the use of two or more basic authentication methods.(2words)
- 8. / Information security procedures protect information integrity by _________ fictitious transactions.
- 9. / ________ is/are an example of a detective control.(2words)
- 10. / _______ teams is an example of a corrective control? (2words)
- 14. / The Trust Services Framework reliability principle that states that users must be able to enter, update, and retrieve data during agreed-upon times is known as _________
- 15. / awareness _______is one of preventive controls that is necessary to provide adequate security for social engineering threats?