Security
Across
- 3. physical or logical subnet that separates an internal network from the internet
- 4. It is usually better to lose functionality rather than security.
- 7. Hides the data being transferred between parties.
- 8. The most common method of tracking a customer accessing an organization’s website is by assigning a unique
- 10. Analyzes running code while simulating outside, or “black box” attacks.
- 11. is the point where data transfers from the intranet to the internet and vice-versa.
- 12. Verifies that the data has not been forged or tampered with.
- 13. is a set of algorithms that specifies details such as which shared encryption keys, or session keys, will be used for that particular session.
- 15. This type of ethical hacker attempts to break into the application in order to detect vulnerabilities and find potential attack vectors with the aim of protecting the system from a real attack
- 16. critical data should be maintained in the event of catastrophic system failure.
- 17. is at the root of many security issues.
Down
- 1. is the monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communication.
- 2. Confidentiality, integrity, and availability
- 3. aims to detect security holes from day one in order to prevent security issues
- 5. This principle dictates that each task, process, or user is granted the minimum rights required to perform its job.
- 6. an attacker can maliciously inject JavaScript into an application running on the victim’s browser.
- 9. This requires developers to check their code as they are writing it to ensure that security issues are not being introduced during development.
- 14. ensure that a user is who they say they are.