Internet Security
Across
- 2. protection of actual equipment
- 7. people accessing the information is who they say they are
- 8. data has not been altered in an unauthorized manner
- 9. only provide access to information necessary to perform the job at hand
- 11. Access Control List
- 14. starting point in developing an overall security plan
- 15. message gets encrypted regardless, only authorized users can decrypt it
Down
- 1. information can be accessed and modified by authorized individuals in an appropriate timeframe
- 3. sender and receiver have keys, very risky
- 4. restrict access to authorized individuals
- 5. Inspects and stops packets of information that don’t apply to a strict set of rules
- 6. easiest to break in regards to security
- 10. important information should be stored in seperate location
- 12. scrambles information during transmission or storage
- 13. A good way to remember role-based access control