Security terms puzzle

1234567891011121314151617
Across
  1. 3. Ensuring data and resources are accessible when needed. Bell-La Padula security model – A security model focused on data confidentiality using mandatory access controls.
  2. 5. A decoy system designed to lure and detect attackers.
  3. 10. Protecting information from unauthorized access.
  4. 12. Engineering Manipulating people to gain unauthorized access to information.
  5. 15. Hacking phone systems to make free calls or manipulate networks.
  6. 16. Security Protecting an individual computer or device from threats.
  7. 17. through obscurity Hiding system details to reduce security risks.
Down
  1. 1. Aggregation Combining data from multiple sources for analysis.
  2. 2. Privilege Granting users the minimum access necessary for their tasks.
  3. 3. Verifying the identity of a user or system.
  4. 4. of duties Dividing responsibilities to prevent fraud and errors.
  5. 6. A security system that monitors and controls network traffic.
  6. 7. Digital documents that verify identities and enable secure communication.
  7. 8. Preventing denial of actions, ensuring accountability.
  8. 9. Security Protecting a network from threats and unauthorized access.
  9. 10. Computing Delivering computing services over the internet.
  10. 11. Gaining unauthorized access to systems or networks.
  11. 13. Ensuring data is accurate and unaltered.
  12. 14. Security Using multiple security measures to protect data and systems.