Information Assurance and Security
Across
- 2. Ensures systems are accessible when needed (The A in CIA)
- 3. A one-way function that turns data into a fixed-length string (used for passwords)
- 5. The assurance that someone cannot deny the validity of something (like a signature)
- 8. Random data added to a password before hashing it
- 9. Malware that replicates itself to spread to other computers (no host needed)
- 12. Converting ciphertext back into plaintext
- 13. Authentication using physical characteristics like fingerprints
- 14. The process of verifying who a user is
- 17. Malware disguised as legitimate software
- 19. A fraudulent attempt to obtain sensitive info by disguising as a trustworthy entity
- 21. Spyware that records every keystroke made by a user
- 22. Ensures data has not been altered or tampered with (The I in CIA)
- 23. A list of entities that are approved for unauthorized access
- 24. An attack that floods a system with traffic to shut it down (Distributed Denial of Service)
Down
- 1. Malware that locks your data and demands payment
- 4. Malicious code that attaches itself to a host program to replicate
- 6. The process of verifying what a user is allowed to do
- 7. Ensures information is not disclosed to unauthorized individuals (The C in CIA)
- 10. A potential danger that can exploit a vulnerability
- 11. Extends a private network across a public network (Virtual Private Network)
- 13. A list of entities that are denied access
- 15. Code or a technique that takes advantage of a vulnerability
- 16. Converting plaintext into ciphertext to secure it
- 18. A network security device that monitors and blocks traffic
- 20. A weakness or flaw in a system