CyberCrossWord

1234567891011121314151617181920212223242526272829
Across
  1. 2. Assures that individuals control what information related to them may be collected, stored, and to whom is shared to
  2. 7. Assures that a system performs its intended function in an unimpaired manner
  3. 8. The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity
  4. 11. Preserving authorized information access, or disclosure
  5. 12. The conversion of plaintext data into unintelligible form
  6. 15. A potential security harm to an asset
  7. 16. Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself
  8. 18. An attempt to alter system resources or affect their operation
  9. 20. Any mechanisms that bypasses a normal security check; it may allow unauthorized access to functionality
  10. 23. Weakness in an information system
  11. 24. Assures that information and programs are changed only in a specified and authorized manner
  12. 25. A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources
  13. 26. A decoy system designed to lure a potential attacker away from critical systems
  14. 27. Assures that systems work promptly and service is not denied to authorized users
  15. 29. Assures that a system performs its intended function in an unimpaired manner
Down
  1. 1. A plastic card that can store and process data
  2. 3. Confidentiality, integrity, and availability
  3. 4. Key A temporary encryption key used between two principals
  4. 5. Function used to protect passwords that are stored in the local database
  5. 6. A procedure whereby two communicating parties can cooperate to acquire a shared secret key
  6. 8. The process of verifying an identity by or for a system
  7. 9. Assures that private information is disclosed to unauthorized individuals
  8. 10. Program that can replicate itself and send copies from computer to computer across network connections
  9. 13. An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result
  10. 14. Guarding against improper information modification or destruction
  11. 17. Attack An attempt to learn or make use of information from the system that does not affect system resources
  12. 19. A program that takes over another computer and it's used to launch attacks
  13. 21. A random value that is concatenated with a password
  14. 22. The output of an encryption algorithm; the encrypted form of a message or data
  15. 28. Code embedded in a program that copies itself and performs unwanted function