Database security

12345678910111213141516171819202122232425
Across
  1. 2. The most common form of authentication, where users must provide a secret word or phrase to gain access, though it is often vulnerable to attacks if not used alongside other security measures.
  2. 5. What are the 3 Principles of Information Security? (third one)
  3. 8. A data type that is simply a sequence of characters hash character for comments
  4. 10. An authentication method that relies on unique physical characteristics, such as fingerprints or facial recognition, to verify the identity of users.
  5. 11. Malicious software that can corrupt or steal data stored in a database.
  6. 14. Software used to protect against malicious software
  7. 19. Logical Operator that evaluates to false If condition evaluates to true.
  8. 20. The process of controlling who has access to specific data in a database.
  9. 22. What are the 3 Principles of Information Security? (first one) (This cybersecurity principle ensures that information is only accessible to those who are authorized to access it.)
  10. 23. if its boolean expression is true, then executes a block of code
  11. 24. The act of scrambling data to prevent unauthorized access. A cryptographic technique that protects data by transforming it into an unreadable format, which can only be decoded with a special key.
  12. 25. A _______ statement allows us to execute a statement or group of statements multiple times
Down
  1. 1. The term used to describe unauthorized access to a computer network with the intent to cause damage or theft
  2. 3. Logical Operator that evaluates to true If any of the operands are true then condition becomes true in Python
  3. 4. Merges the string representations of elements in sequence seq into a string, with separator string
  4. 6. This process is critical for verifying that the user requesting database access is who they claim to be, typically involving methods like passwords or biometrics.
  5. 7. A type of cyberattack where malicious code is inserted into SQL queries to access data.
  6. 9. A function that returns the smallest item in an iterable
  7. 12. A security measure that requires users to verify their identity using two or more distinct methods, such as a password, a code sent to a phone, or a fingerprint scan.
  8. 13. keeps executing as long as True
  9. 15. What are the 3 Principles of Information Security? (second one)
  10. 16. The primary language used to create web pages
  11. 17. Malicious software designed to harm or exploit any programmable device
  12. 18. Logical Operator that evaluates to true If both the operands are true then condition becomes true. Modulus Divides left hand operand by right hand operand and returns remainder
  13. 21. How many times will the following while loop run? x = 5 while x > 0: x -= 1