Crash Course Computer Science Cybersecurity
Across
- 5. Good developers should take the approach that, not if, but when their programs are compromised, the damage should be limited and contained, and not let it compromise other things running on the computer. This principle is called what
- 6. What you know and what you have authentication have the nice property of being ______ either correct or incorrect
- 8. For organizations with users at different levels of access it’s especially important for Access Control Lists to be _____ to ensure secrecy, integrity and availability
- 9. To differentiate between right and wrong people, we use ____the process by which a computer understands who it’s interacting with.Generally, there are three types, each with their own pros and cons: What you know authentication is based on knowledge of a secret that should be known only by the real user and the computer
- 10. What is a set of techniques to protect the secrecy, integrity and availability of computer systems and data against threats
- 11. To achieve these three general goals, security experts start with a specification of who your “enemy” is, at an abstract level, called a what
- 13. After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer.-____ permission allows a user to run a file, like a program
- 14. So,security experts suggest using two or more forms of authentication for important Accounts. This is known as two-factor or ______ authentication
Down
- 1. the best we have right now is a process called Independent Verification and ____
- 2. They typically require _________, so it’s much harder for remote attackers to gain access. What you are authentication is based on... you! You authenticate by presenting yourself to the computer
- 3. How a system is secured what on who it’s being secured against
- 4. After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -____ permission allows a user to modify the contents
- 7. Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what
- 8. Another issue with biometric authentication is it what
- 12. Operating Systems attempt to _____ applications by giving each their own block of memory that others programs can’t touch
- 15. After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -_____permission allows a user to see the contents of a file