SN33003FP Chapter 4
Across
- 2. The art of making the message confusing, ambiguous, or harder to understand
- 3. A substitute control used when the ideal option is not possible
- 5. Conceals data (the message) in another file such as a graphic, audio, or other text file
- 6. Keeps track of what you do, including what you access, the amount of time you access resources, and any changes made
- 10. Uses the same pre-shared (public) key to encrypt and decrypt data
- 12. The science of making and breaking secret codes
- 14. Process of claiming your identity within a system
- 15. Secures data by replacing sensitive information with a non-sensitive version
- 16. Identifies the different types of unauthorized activity
- 17. Combines plaintext with a secret key to create ciphertext (encrypted text)
- 18. Letters are replaced
- 19. Actual barriers deployed to prevent unauthorized users from gaining physical access
- 20. Determines which resources you can access, and the operations that you can perform
- 21. Discourages individuals from doing the wrong thing
- 22. Counteracts something that is undesirable and restores systems to normal after unauthorized activity occurs
- 23. Verifies your identity with what you know, what you have, or who you are
- 24. Involves identification, authentication, authorization, and accountability
Down
- 1. Uses one key to encrypt data and a different key to decrypt data
- 4. Restores resources, functions, and capabilities after a violation of a security policy
- 7. Policies and procedures defined by organizations to implement and enforce all aspects of controlling unauthorized access
- 8. Stops unwanted or unauthorized activity from happening
- 9. Uses at least two methods of verification
- 11. A way to store and transmit data so only the intended recipient can read or process it
- 13. Letters are rearranged