What is Cyber Security: Vocabulary Review
Across
- 3. the practice of isolating resources and controlling access to them through APIs or strict interfaces
- 4. a design technique that separates the functionality of a program into independent, interchangeable components.
- 8. the process of breaking down complex cybersecurity models into abstract components to simplify and clearly define their security roles.
- 10. the practice of protecting data from unauthorized access, disclosure, or alteration
- 11. the protection of data from unauthorized modification or deletion.
- 12. a cybersecurity technique that protects processes from each other on an operating system.
- 13. a design principle that emphasizes the importance of simplicity in cyber security systems and logics
- 14. the practice of concealing information within other data, structures, or media to prevent unauthorized access.
- 15. the principle of granting users only the minimum level of access or permissions necessary to perform their job functions
- 16. the practice of collecting, processing, and storing only the minimum amount of data needed to complete a specific task.
Down
- 1. creating secondary safety nets that bolster network security and mitigate single points of failure throughout the network.
- 2. the ability to reliably access and use information in a timely manner.
- 5. a cybersecurity strategy that uses multiple layers of security measures to protect an organization's assets.
- 6. a process that separates data, processes, and administrative tasks into logical groupings, or domains.
- 7. the practice of reducing unnecessary complexity and focusing on what's essential
- 9. a way of looking at the world from the perspective of a hacker