CS Unit 2 Vocab

123456789101112131415161718
Across
  1. 5. identity verification
  2. 7. software that is programmed to detect, prevent, and remove viruses from devices
  3. 10. a network that only uses cables to connect to devices or the internet
  4. 13. a network that transmit data extremely fast through thin strands of plastic or glass fiber
  5. 14. data stored on a device that is not connected to the internet or to a network
  6. 15. open authorization and two-factor authentication
  7. 16. security process that requires two different forms/factors of authentication to verify someone's identity
  8. 17. the data is trustworthy and accurate (part of the CIA triad)
  9. 18. the exposure something has to being in danger
Down
  1. 1. to reduce the severity of something
  2. 2. the accessibility of data to authorized users (part of the CIA triad)
  3. 3. services that are useable
  4. 4. the core fundamental concept of cybersecurity
  5. 6. proof that someone/something has performed a digital action, so they can not deny involvement
  6. 8. network security systems that monitor and control network trafficet, used as barriers between internal and external networks
  7. 9. only people who are authorized have access to data (part of the CIA triad)
  8. 11. network security tool that monitors system and network activity for threats and mitigates them immediately
  9. 12. network security tool that monitors system and nwork activity for suspicious behavior