Cybersecurity Fundamentals Chapter 5
Across
- 2. Digital certificates are used to establish the identity of an entity (person, organization, or device) in online communications.
- 4. Verifies that the data entered into a system conforms to expected formats and types, helping prevent common database attacks that involve injecting malformed data
- 7. Methods and processes to ensure that data remains accurate, consistent, and reliable throughout its lifecycle.
- 8. **: Identifies patterns in data that do not conform to expected behavior.
- 11. Cryptographic methods used to validate the authenticity and integrity of a message, software, or digital document.
- 12. The processes and rules applied to maintain the integrity of data within a database.
- 13. Maintains the consistency of relationships between tables.
Down
- 1. Mechanisms to ensure correct data entry into systems.
- 3. Checks that data falls within specified parameters, ensuring completeness, accuracy, and consistency.
- 5. Custom rules defined by users to meet specific data integrity requirements that are not covered by the other types of integrity rules
- 6. Ensures that each row in a table has a unique identifier, typically a primary key, which uniquely identifies each entity in the table
- 9. Ensures that data in a column adheres to a defined set of valid values.
- 10. Techniques used to ensure data integrity by converting data into a fixed-length hash value.