Cybersecurity Fundamental Chapter 2
Across
- 3. Ensures that information is accessible only to those authorized to have access.
- 6. The foundational principles of cybersecurity.
- 8. A framework developed by John McCumber to manage and protect networks, domains, and the Internet.
- 10. The three categories of measures used to protect cyberspace: Technologies (devices and products), Policies and Practices (procedures and guidelines), and People (awareness and knowledge)
Down
- 1. The ISO Cybersecurity Model, including ISO 27001 and ISO 27002 standards, provides a framework for managing information security.
- 2. Data that is stored on physical media (e.g., hard drives, USB drives, cloud storage). Protecting data at rest involves encryption, access controls, and physical security measures.
- 4. Data that is being transmitted across networks (e.g., emails, data transfers). Securing data in transit involves using secure communication protocols such as SSL/TLS, VPNs, and encryption.
- 5. Data that is being actively processed by applications. Protecting data in process requires secure coding practices, memory protection mechanisms, and ensuring that applications handle data securely.
- 7. Ensures that information and resources are accessible to authorized users when needed.
- 9. Ensures that information remains accurate and complete throughout its lifecycle.
- 11. The three states in which data can exist and require protection.