Across
- 3. The entire set of all possible keys for a specific encryption algorithm
- 6. The method of hiding data inside other data
- 9. Malware that encrypts sensitive files and offers their return for ransom
- 10. Refers to the security principle that states that information should not be disclosed to unauthorised individuals
- 12. ___________ is defined as the likelihood of an incident and its consequences for an asset
- 14. The process of packaging packets so that they can traverse a network in a secure, confidential manner
- 18. A step-by-step procedure - typically an established computation for solving a problem within a set number of steps
- 19. Malicious software that masquerades as legitimate software
- 20. What type of encryption algorithm does RSA encryption use?
- 21. The targeting of high-value individuals
- 23. A network device used to segregate traffic based on rules
- 24. Address the who what and why. High-level broad statements of what the organisation wants to accomplish
- 27. The security principle that requires that information is not modified except by those authorised to do so
- 28. Abbreviation of a legal document to describe bilateral agreements between parties and outlines which party is responsible for what portion of work
- 29. A form of authentication that involves the transferring of credentials between systems
- 30. Password ________________ specifies that the password must meet the minimum length requirement and have characters from multiple different groups
Down
- 1. A system or software as it is built and functioning at a specific point in time. Serves as a foundation for comparison or measurement, providing the necessary visibility to control change
- 2. Risk __________________ implies the risk is shared with another entity
- 4. Malware that changes code at the time of infection
- 5. Type of cryptographic key that are only used once after they are generated
- 7. Attacks that are launched from multiple connected devices across the internet, collectively known as a botnet
- 8. The process of strengthening a host level of security by performing specific system preparations
- 11. Ensures that an individual is who they claim to be
- 12. The special user or super user account associated with UNIX systems
- 13. A weakness in an asset that can be exploited by a threat to cause harm
- 15. Form of encryption that creates a digest of the data put into the algorithm. These algorithms are referred to as one-way algorithms because there is no feasible way to decrypt what has been encrypted
- 16. The art of secret writing that enables an individual to hide the contents of a message or file from all but the intended recipient
- 17. A specific piece of malicious code or software that self-replicates
- 20. Refers to the security principle that specifically states that hardware, software and data should be present and accessible when the subject wants to access or use them
- 22. Measurements of a certain biological factors to identify a specific person
- 25. The measurement of uncertainty associated with a series of values
- 26. Cryptographic algorithm that uses the same key for encryption and decryption
