CSE 167 Vocab / Terminology
Across
- 4. the idea of adding defense in layers.
- 6. basic Linux file permissions include: read, write, and ____.
- 9. assumes people can get that information when they need it.
- 11. the type of key in asymmetric encryption that you use to decrypt a message when someone encrypts a message for you.
- 12. protection of computer systems and networks from information disclosure.
- 13. type of encryption where only one key is shared amongst sender and receiver.
Down
- 1. only authorized people have access to records.
- 2. verification of identity.
- 3. saving a copy of system data for restoration in the event that the system would need to be reset.
- 4. a system or place that must be protected.
- 5. only authorized people can modify data.
- 7. the practice of secure communications that allow only the sender and receiver to view a message's contents.
- 8. covers the protection of encryption systems.
- 10. the problem with cybersecurity today is that people use TRUST instead of ______.
- 12. come in four types: physical, technical, procedural, and legal.