UNiX

123456789101112131415161718192021222324252627282930
Across
  1. 3. The entire set of all possible keys for a specific encryption algorithm
  2. 6. The method of hiding data inside other data
  3. 9. Malware that encrypts sensitive files and offers their return for ransom
  4. 10. Refers to the security principle that states that information should not be disclosed to unauthorised individuals
  5. 12. ___________ is defined as the likelihood of an incident and its consequences for an asset
  6. 14. The process of packaging packets so that they can traverse a network in a secure, confidential manner
  7. 18. A step-by-step procedure - typically an established computation for solving a problem within a set number of steps
  8. 19. Malicious software that masquerades as legitimate software
  9. 20. What type of encryption algorithm does RSA encryption use?
  10. 21. The targeting of high-value individuals
  11. 23. A network device used to segregate traffic based on rules
  12. 24. Address the who what and why. High-level broad statements of what the organisation wants to accomplish
  13. 27. The security principle that requires that information is not modified except by those authorised to do so
  14. 28. Abbreviation of a legal document to describe bilateral agreements between parties and outlines which party is responsible for what portion of work
  15. 29. A form of authentication that involves the transferring of credentials between systems
  16. 30. Password ________________ specifies that the password must meet the minimum length requirement and have characters from multiple different groups
Down
  1. 1. A system or software as it is built and functioning at a specific point in time. Serves as a foundation for comparison or measurement, providing the necessary visibility to control change
  2. 2. Risk __________________ implies the risk is shared with another entity
  3. 4. Malware that changes code at the time of infection
  4. 5. Type of cryptographic key that are only used once after they are generated
  5. 7. Attacks that are launched from multiple connected devices across the internet, collectively known as a botnet
  6. 8. The process of strengthening a host level of security by performing specific system preparations
  7. 11. Ensures that an individual is who they claim to be
  8. 12. The special user or super user account associated with UNIX systems
  9. 13. A weakness in an asset that can be exploited by a threat to cause harm
  10. 15. Form of encryption that creates a digest of the data put into the algorithm. These algorithms are referred to as one-way algorithms because there is no feasible way to decrypt what has been encrypted
  11. 16. The art of secret writing that enables an individual to hide the contents of a message or file from all but the intended recipient
  12. 17. A specific piece of malicious code or software that self-replicates
  13. 20. Refers to the security principle that specifically states that hardware, software and data should be present and accessible when the subject wants to access or use them
  14. 22. Measurements of a certain biological factors to identify a specific person
  15. 25. The measurement of uncertainty associated with a series of values
  16. 26. Cryptographic algorithm that uses the same key for encryption and decryption