Cybersecurity Fundamental Chapter 2

1234567891011
Across
  1. 3. Ensures that information is accessible only to those authorized to have access.
  2. 6. The foundational principles of cybersecurity.
  3. 8. A framework developed by John McCumber to manage and protect networks, domains, and the Internet.
  4. 10. The three categories of measures used to protect cyberspace: Technologies (devices and products), Policies and Practices (procedures and guidelines), and People (awareness and knowledge)
Down
  1. 1. The ISO Cybersecurity Model, including ISO 27001 and ISO 27002 standards, provides a framework for managing information security.
  2. 2. Data that is stored on physical media (e.g., hard drives, USB drives, cloud storage). Protecting data at rest involves encryption, access controls, and physical security measures.
  3. 4. Data that is being transmitted across networks (e.g., emails, data transfers). Securing data in transit involves using secure communication protocols such as SSL/TLS, VPNs, and encryption.
  4. 5. Data that is being actively processed by applications. Protecting data in process requires secure coding practices, memory protection mechanisms, and ensuring that applications handle data securely.
  5. 7. Ensures that information and resources are accessible to authorized users when needed.
  6. 9. Ensures that information remains accurate and complete throughout its lifecycle.
  7. 11. The three states in which data can exist and require protection.