Across
- 2. One of the common careers found in Cybersecurity and that is Cybersecurity ________.
- 3. One of the words that was added in the CIA triad, The Usefulness fitness for a particular use.
- 6. The CIA triad is a common model that forms the basis for the development of security systems.
- 7. A security tool that monitors network traffic or system activities to identify and respond to potential unauthorized access or malicious behavior.
- 9. Strategies, policies, and technologies implemented to prevent the unauthorized loss or exfiltration of sensitive or confidential data.
- 11. It is a set of six elements of information security. It adds three additional attributes to the three classic security attributes of the CIA triad.
- 14. The two protocols that provide secure communication over the internet by encrypting data transmitted between a web server and a client browser.
- 16. A security tool that monitors and actively blocks or prevents malicious activities or attacks on a network or system.
- 17. The two protocols that provide secure communication over the internet by encrypting data transmitted between a web server and a client browser.
- 21. A security measure that requires users to provide two different forms of authentication, such as a password and a unique code sent to their mobile device, to access a system or account.
- 23. It is the practice of safeguarding information from unauthorized access, use, or damage.
- 25. Weaknesses or flaws in a system's design, implementation, or configuration that can be exploited by attackers to gain unauthorized access or compromise security.
- 26. One of the three letters in the CIA Triad, and it involves making sure your data is trustworthy and free from tampering.
- 27. The person who proposed the Parkerian Hexad in 1998.
- 28. It is a popular Cybersecurity Company, and it delivers a high-performance network security solutions that protect your systems
- 29. Cybersecurity and Information security have the same ______ security practices.
- 30. It refers to the protection of computer systems, networks, and data from unauthorized access, attacks, and damage. It involves implementing measures to prevent, detect, and respond to cyber threats, such as hacking, malware, and data breaches.
Down
- 1. An adverse event or occurrence that poses a risk to information security, such as a breach, unauthorized access, or system compromise.
- 4. One of the words that was added in the CIA triad, The correct attribution of origin such as the authorship of an email message or the correct description of information such as a data field that is properly named.
- 5. A network security device that monitors and controls incoming and outgoing network traffic based on predefined security rules.
- 8. One of the three letters in the CIA Triad, it involves data is kept confidential and its integrity maintained, it is often useless unless it is available to those in the organization and the customers they serve.
- 10. One of the words that was added in the CIA triad, The ownership or control of information, as distinct from confidentiality.
- 12. An attack aimed at overwhelming a system, network, or service with a flood of traffic or requests, causing it to become unavailable to legitimate users.
- 13. A form of cyber attack where attackers impersonate trustworthy entities through deceptive emails, messages, or websites to trick individuals into revealing sensitive information.
- 15. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. Examples include viruses, worms, Trojans, and ransomware.
- 18. A controlled process of simulating real-world attacks on a system or network to identify vulnerabilities and assess the effectiveness of security measures. ¬‿¬
- 19. One of the three letters in the CIA Triad, and it involves the efforts of an organization to make sure data is kept secret or private.
- 20. A documented set of guidelines, procedures, and rules that outline an organization's approach to information security, including roles and responsibilities, acceptable use policies, and incident response procedures.
- 22. One of the common careers found in Information Security and that is Information Security ________.
- 24. Unauthorized access, acquisition, or disclosure of sensitive or confidential information.