CSC 200 Cybersecurity
Across
- 4. Deploying a security officer at the premises gate is an example of _____ control.
- 8. _____ is a type of attacker who wants to make a statement and perform targeted cyber attacks
- 9. Ensures transmission and storage of information in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the information.
- 10. Prevents either sender or receiver from denying a transmitted message.
- 12. Assures that the system works promptly and service is not denied to authorized users.
Down
- 1. _______ is the act of accessing information during transmission.
- 2. _________ unauthorized access and modification of an asset.
- 3. _________ means an information becomes lost, unavailable, or unusable
- 5. Preserving authorized restriction on information access and disclosure, including means for protection personal privacy and proprietary information
- 6. A weakness which allows an attacker to reduce a system's information assurance.
- 7. A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
- 11. Phishing and attachments target the _________ threat vector