Cybersecurity Fundamentals Chapter 4 Part 2
Across
- 4. uses at least two methods of verification.
- 8. restricts the actions that a subject can perform on an object.
- 10. keeps something from happening.
- 12. conceals data in another file such as a graphic, audio, or other text file.
- 13. return to restore back to a state of Confidentially, integrity and availability.
- 14. passwords, passphases, or pins are examples of something that the user knows.
- 16. opposite of a reward.
Down
- 1. use and practice of data masking and steganography techniques.
- 2. counteracts something that is undesirable.
- 3. smart cards and security key fobs are examples of something that users have in their possession.
- 5. replaces data with authentic looking values to apply anonymity to the data records.
- 6. to make up for something.
- 7. unique physical characteristics, such as a fingerprint, retina, or voice, that identifies a specific user is called biometrics.
- 9. uses access control lists (ACLs) to help determine whether to grant access.
- 11. derives from substitution set from the same column of data that a user wants to mask.
- 15. is the act or process of noticing or discovering something.