Crash Course Computer Science Cybersecurity

12345678910111213141516
Across
  1. 5. So,security experts suggest using two or more forms of authentication for important Accounts. This is known as two-factor or ______ authentication
  2. 7. For organizations with users at different levels of access it’s especially important for Access Control Lists to be _____ to ensure secrecy, integrity and availability
  3. 10. After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -____ permission allows a user to modify the contents
  4. 11. Another issue with biometric authentication is it what
  5. 12. How a system is secured what on who it’s being secured against
  6. 14. What is a set of techniques to protect the secrecy, integrity and availability of computer systems and data against threats
  7. 16. Good developers should take the approach that, not if, but when their programs are compromised, the damage should be limited and contained, and not let it compromise other things running on the computer. This principle is called what
Down
  1. 1. the best we have right now is a process called Independent Verification and ____
  2. 2. To differentiate between right and wrong people, we use ____the process by which a computer understands who it’s interacting with.Generally, there are three types, each with their own pros and cons: What you know authentication is based on knowledge of a secret that should be known only by the real user and the computer
  3. 3. Operating Systems attempt to _____ applications by giving each their own block of memory that others programs can’t touch
  4. 4. To achieve these three general goals, security experts start with a specification of who your “enemy” is, at an abstract level, called a what
  5. 6. They typically require _________, so it’s much harder for remote attackers to gain access. What you are authentication is based on... you! You authenticate by presenting yourself to the computer
  6. 8. After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer.-____ permission allows a user to run a file, like a program
  7. 9. Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what
  8. 13. What you know and what you have authentication have the nice property of being ______ either correct or incorrect
  9. 15. After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -_____permission allows a user to see the contents of a file