Cybersecurity Fundamental Chapter 2

123456789101112131415
Across
  1. 3. a type of storage device retains the data when no user or process is using it.
  2. 5. cyber criminals can capture, save and steal data in-transit.
  3. 9. uses removable media to physically move data from one computer to another.
  4. 10. procedures, and guidelines that enable the citizen of the cyber world to stay safe and follow good practices.
  5. 12. devices, and product available to protect information systems and fend off cyber criminals.
  6. 14. verifies the identify of a user to prevent unauthorized access.
  7. 15. uses cable to transmit data.
Down
  1. 1. verifies determine which resources users can access, along with the operations that users can perform.
  2. 2. is the principle used to describe the need to maintain availability of information systems and services at all times.
  3. 4. involves sending information from one device to another.
  4. 5. cyber criminals can use rogue or unauthorized devices to interrupt data availability.
  5. 6. cyber criminals can intercept and alter data in-transit.
  6. 7. aware and knowledgeable about their world and the dangers that threaten their world.
  7. 8. keeps tracks of what users do, including what they access, the amount of time they access resources, and any changes made.
  8. 11. prevents the disclosure of information to unauthorize people, resource and processes.
  9. 13. uses the airways to transmit data.