Cyber Security Puzzle
Across
- 5. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
- 7. the fabrication of a false online identity by a cybercriminal for the purposes of deception, fraud, or exploitation
- 9. an attack in which someone sends unsolicited messages to a Bluetooth-enabled device
- 11. An event which causes unplanned interruption in operations or functions for an unacceptable length of time.
- 14. process of determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.
- 15. the physical opening where a data cable can be plugged in
Down
- 1. an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them
- 2. A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
- 3. a form of testing that is performed with knowledge of a target system's internals
- 4. any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application
- 6. an unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.
- 8. capability to limit network traffic between networks and/or information systems.
- 10. The use of mathematical techniques to provide security services, such as confidentiality, data integrity, entity authentication, and data origin authentication.
- 12. a design and programming philosophy that focuses on formally correct and verifiable input handling throughout all phases of the software development lifecycle
- 13. The unauthorized transfer of information from an information system.