Security terms puzzle
Across
- 3. Ensuring data and resources are accessible when needed. Bell-La Padula security model – A security model focused on data confidentiality using mandatory access controls.
- 5. A decoy system designed to lure and detect attackers.
- 10. Protecting information from unauthorized access.
- 12. Engineering Manipulating people to gain unauthorized access to information.
- 15. Hacking phone systems to make free calls or manipulate networks.
- 16. Security Protecting an individual computer or device from threats.
- 17. through obscurity Hiding system details to reduce security risks.
Down
- 1. Aggregation Combining data from multiple sources for analysis.
- 2. Privilege Granting users the minimum access necessary for their tasks.
- 3. Verifying the identity of a user or system.
- 4. of duties Dividing responsibilities to prevent fraud and errors.
- 6. A security system that monitors and controls network traffic.
- 7. Digital documents that verify identities and enable secure communication.
- 8. Preventing denial of actions, ensuring accountability.
- 9. Security Protecting a network from threats and unauthorized access.
- 10. Computing Delivering computing services over the internet.
- 11. Gaining unauthorized access to systems or networks.
- 13. Ensuring data is accurate and unaltered.
- 14. Security Using multiple security measures to protect data and systems.