Information Assurance and Security

123456789101112131415161718192021222324
Across
  1. 2. Ensures systems are accessible when needed (The A in CIA)
  2. 3. A one-way function that turns data into a fixed-length string (used for passwords)
  3. 5. The assurance that someone cannot deny the validity of something (like a signature)
  4. 8. Random data added to a password before hashing it
  5. 9. Malware that replicates itself to spread to other computers (no host needed)
  6. 12. Converting ciphertext back into plaintext
  7. 13. Authentication using physical characteristics like fingerprints
  8. 14. The process of verifying who a user is
  9. 17. Malware disguised as legitimate software
  10. 19. A fraudulent attempt to obtain sensitive info by disguising as a trustworthy entity
  11. 21. Spyware that records every keystroke made by a user
  12. 22. Ensures data has not been altered or tampered with (The I in CIA)
  13. 23. A list of entities that are approved for unauthorized access
  14. 24. An attack that floods a system with traffic to shut it down (Distributed Denial of Service)
Down
  1. 1. Malware that locks your data and demands payment
  2. 4. Malicious code that attaches itself to a host program to replicate
  3. 6. The process of verifying what a user is allowed to do
  4. 7. Ensures information is not disclosed to unauthorized individuals (The C in CIA)
  5. 10. A potential danger that can exploit a vulnerability
  6. 11. Extends a private network across a public network (Virtual Private Network)
  7. 13. A list of entities that are denied access
  8. 15. Code or a technique that takes advantage of a vulnerability
  9. 16. Converting plaintext into ciphertext to secure it
  10. 18. A network security device that monitors and blocks traffic
  11. 20. A weakness or flaw in a system