CS Unit 2 Vocab
Across
- 5. identity verification
- 7. software that is programmed to detect, prevent, and remove viruses from devices
- 10. a network that only uses cables to connect to devices or the internet
- 13. a network that transmit data extremely fast through thin strands of plastic or glass fiber
- 14. data stored on a device that is not connected to the internet or to a network
- 15. open authorization and two-factor authentication
- 16. security process that requires two different forms/factors of authentication to verify someone's identity
- 17. the data is trustworthy and accurate (part of the CIA triad)
- 18. the exposure something has to being in danger
Down
- 1. to reduce the severity of something
- 2. the accessibility of data to authorized users (part of the CIA triad)
- 3. services that are useable
- 4. the core fundamental concept of cybersecurity
- 6. proof that someone/something has performed a digital action, so they can not deny involvement
- 8. network security systems that monitor and control network trafficet, used as barriers between internal and external networks
- 9. only people who are authorized have access to data (part of the CIA triad)
- 11. network security tool that monitors system and network activity for threats and mitigates them immediately
- 12. network security tool that monitors system and nwork activity for suspicious behavior