SN33003FP Chapter 4

123456789101112131415161718192021222324
Across
  1. 2. The art of making the message confusing, ambiguous, or harder to understand
  2. 3. A substitute control used when the ideal option is not possible
  3. 5. Conceals data (the message) in another file such as a graphic, audio, or other text file
  4. 6. Keeps track of what you do, including what you access, the amount of time you access resources, and any changes made
  5. 10. Uses the same pre-shared (public) key to encrypt and decrypt data
  6. 12. The science of making and breaking secret codes
  7. 14. Process of claiming your identity within a system
  8. 15. Secures data by replacing sensitive information with a non-sensitive version
  9. 16. Identifies the different types of unauthorized activity
  10. 17. Combines plaintext with a secret key to create ciphertext (encrypted text)
  11. 18. Letters are replaced
  12. 19. Actual barriers deployed to prevent unauthorized users from gaining physical access
  13. 20. Determines which resources you can access, and the operations that you can perform
  14. 21. Discourages individuals from doing the wrong thing
  15. 22. Counteracts something that is undesirable and restores systems to normal after unauthorized activity occurs
  16. 23. Verifies your identity with what you know, what you have, or who you are
  17. 24. Involves identification, authentication, authorization, and accountability
Down
  1. 1. Uses one key to encrypt data and a different key to decrypt data
  2. 4. Restores resources, functions, and capabilities after a violation of a security policy
  3. 7. Policies and procedures defined by organizations to implement and enforce all aspects of controlling unauthorized access
  4. 8. Stops unwanted or unauthorized activity from happening
  5. 9. Uses at least two methods of verification
  6. 11. A way to store and transmit data so only the intended recipient can read or process it
  7. 13. Letters are rearranged