social media data collection & unit 2 vocab
Across
- 3. A tool monitoring system activities and network traffic for policy violations or malicious activity and lets the administrator know when something suspicious happens.
- 6. The possibility for damage and harm to data and digital systems, which outcomes from a threat making use of a vulnerability.
- 7. When maintaining the accuracy and preventing unauthorized modification
- 12. Implementing measures to reduce the risk of a cyberattack or to make it less impactful if it does happen.
- 13. A cybersecurity model which defines the primary principles of info security and stands for Confidentiality, Integrity, and Availability
- 14. The process that verifies a user’s identity and prove who they claim to be.
- 15. A process in which verifies that a user is who they claim to be.
- 16. All people can securely and independently understand and use security tools, training, and services without creating new risks.
- 17. making sure data and systems are accessible when needed
- 18. Protecting your info from unauthorized access
Down
- 1. A program that is designed to prevent, remove,and prevent malicious malware like viruses, ransomware, etc from computers.
- 2. A tool monitoring network traffic in real time, detecting and blocking malicious behavior like malware automatically.
- 4. It depends on physical cables for data transmission instead of wireless singles to prevent unauthorized access through remote.
- 5. Provides valid proof that a party was involved in a digital communication or transaction so they can’t deny it later.
- 8. networks It uses light instead of electricity providing a more secure physical foundation for data transmission.
- 9. Keeping sensitive and important data on a device that is disconnected to the internet or a network.
- 10. the process that requires two distinct forms of identification to prove who they are when they log in in their account to add extra protection.
- 11. A network security device or software that monitors and controls incoming and outcoming network traffic.