CyberCrossWord
Across
- 2. Assures that individuals control what information related to them may be collected, stored, and to whom is shared to
- 7. Assures that a system performs its intended function in an unimpaired manner
- 8. The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity
- 11. Preserving authorized information access, or disclosure
- 12. The conversion of plaintext data into unintelligible form
- 15. A potential security harm to an asset
- 16. Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself
- 18. An attempt to alter system resources or affect their operation
- 20. Any mechanisms that bypasses a normal security check; it may allow unauthorized access to functionality
- 23. Weakness in an information system
- 24. Assures that information and programs are changed only in a specified and authorized manner
- 25. A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources
- 26. A decoy system designed to lure a potential attacker away from critical systems
- 27. Assures that systems work promptly and service is not denied to authorized users
- 29. Assures that a system performs its intended function in an unimpaired manner
Down
- 1. A plastic card that can store and process data
- 3. Confidentiality, integrity, and availability
- 4. Key A temporary encryption key used between two principals
- 5. Function used to protect passwords that are stored in the local database
- 6. A procedure whereby two communicating parties can cooperate to acquire a shared secret key
- 8. The process of verifying an identity by or for a system
- 9. Assures that private information is disclosed to unauthorized individuals
- 10. Program that can replicate itself and send copies from computer to computer across network connections
- 13. An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result
- 14. Guarding against improper information modification or destruction
- 17. Attack An attempt to learn or make use of information from the system that does not affect system resources
- 19. A program that takes over another computer and it's used to launch attacks
- 21. A random value that is concatenated with a password
- 22. The output of an encryption algorithm; the encrypted form of a message or data
- 28. Code embedded in a program that copies itself and performs unwanted function