Cybersecurity Fundamentals Chapter 5

12345678910111213
Across
  1. 2. Digital certificates are used to establish the identity of an entity (person, organization, or device) in online communications.
  2. 4. Verifies that the data entered into a system conforms to expected formats and types, helping prevent common database attacks that involve injecting malformed data
  3. 7. Methods and processes to ensure that data remains accurate, consistent, and reliable throughout its lifecycle.
  4. 8. **: Identifies patterns in data that do not conform to expected behavior.
  5. 11. Cryptographic methods used to validate the authenticity and integrity of a message, software, or digital document.
  6. 12. The processes and rules applied to maintain the integrity of data within a database.
  7. 13. Maintains the consistency of relationships between tables.
Down
  1. 1. Mechanisms to ensure correct data entry into systems.
  2. 3. Checks that data falls within specified parameters, ensuring completeness, accuracy, and consistency.
  3. 5. Custom rules defined by users to meet specific data integrity requirements that are not covered by the other types of integrity rules
  4. 6. Ensures that each row in a table has a unique identifier, typically a primary key, which uniquely identifies each entity in the table
  5. 9. Ensures that data in a column adheres to a defined set of valid values.
  6. 10. Techniques used to ensure data integrity by converting data into a fixed-length hash value.