Cyber Vocab 1.1
Across
- 1. A secret string of characters used for authentication.
- 5. Precomputed tables used to reverse cryptographic hash functions.
- 7. Ensuring that information and resources are accessible when needed.
- 9. An attack that attempts common passwords against many accounts.
- 10. When two different inputs produce the same hash output.
- 12. The combination of username and password or other authentication information.
- 13. An authentication method allowing a user to access multiple systems with one login.
- 14. A mix of dictionary and brute force attacks.
- 17. Authentication based on physical or behavioral characteristics - such as fingerprints or facial recognition.
- 20. The practice of protecting systems- networks and programs from digital attacks.
- 21. The process of verifying an individual’s identity before granting access.
- 22. A process of converting data into a fixed-size string - typically used for storing passwords securely.
- 23. The process of verifying the identity of a user or system.
- 24. An organized collection of structured information or data stored electronically.
- 25. A cryptographic attack that exploits the probability of hash collisions.
- 26. Ensuring that information is only accessible to those with proper authorization.
- 27. An incident where unauthorized access to data or systems occurs.
Down
- 2. A method of breaking passwords by systematically entering every word in a dictionary.
- 3. Tracking user actions and activities for auditing and monitoring.
- 4. A digital document used to prove ownership of a public key.
- 6. Physical cards with embedded chips used for secure authentication.
- 8. An attack where stolen credentials are used to gain unauthorized access.
- 11. Maintaining the accuracy and trustworthiness of data.
- 15. An attack that tries all possible combinations to guess a password.
- 16. Restricting access to resources based on user identity and permissions.
- 18. A step-by-step procedure for calculations or problem-solving.
- 19. A sequence of words used instead of a password for authentication.
- 20. A security model consisting of Confidentiality Integrity and Availability.