CSIT - Cybersecurity Vocab

1234567891011
Across
  1. 4. A person or entity responsible for an event that has been identified as a security incident or as a risk
  2. 5. Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted
  3. 7. Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage
  4. 8. The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data
  5. 10. Data that can be used to identify or contact an individual
  6. 11. A physical or virtual item that contains authentication and/or authorization data, commonly used in multifactor authentication
Down
  1. 1. A number used in conjunction with authentication devices
  2. 2. Scans that allow access to a physical space or program by verifying unique body features
  3. 3. unauthorized use is detected or attempted
  4. 6. Security control that can enforce a virtual boundary based on real-world geography
  5. 9. A basic principle of security stating that a person should be allocated the minimum necessary rights, privileges, or information to perform its role