MTA Security Fundamentals

12345678910
Across
  1. 2. A security tactic in which a server or device only has installed on it what it needs to perform its prescribed role.
  2. 4. The act of passing control of a resource (such as an organizational unit) from one entity to another.
  3. 6. The form of authentication that uses devices such as retina scanners
  4. 7. A network security system and/or hardware device which controls any incoming and outgoing network traffic based on a set of rules provided by an administrator.
  5. 9. The act of verifying identification to an application or a system.
  6. 10. A system that traps attackers when they attempt to attack a network.
Down
  1. 1. A mechanism by which a log tracks who has logged on to a system and what has been accessed on the system.
  2. 3. The part of the CIA triangle that ensures data is accessible by those who need it
  3. 5. The part of the CIA triangle that involves ensuring data is accurate
  4. 8. The adding of cipher text to data to scramble the data to make it unreadable without a decryption key.