Across
- 3. The potential for an unwanted or adverse outcome resulting from an incident, event, or occurrence, as determined by the likelihood that a particular threat will exploit a particular vulnerability, with the associated consequences.
- 5. The process of transforming plaintext into ciphertext.
- 6. The application of one or more measures to reduce the likelihood of an unwanted occurrence and/or lessen its consequences.
- 9. malicious code
- 11. A person, structure, facility, information, and records, information technology systems and resources, material, process, relationships, or reputation that has value.
- 12. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
- 15. A set of software tools with administrator-level access privileges installed on an information system and designed to hide the presence of the tools, maintain the access privileges, and conceal the activities conducted by the tools.
- 16. A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
- 19. A digital form of social engineering to deceive individuals into providing sensitive information.
- 20. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
- 22. A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.
- 23. An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
- 25. Qualify a cryptographic key that may be widely published and is used to enable the operation of an asymmetric cryptographic algorithm.
Down
- 1. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
- 2. A capability to limit network traffic between networks and/or information systems.
- 4. The property whereby information, an information system, or a component of a system has not been modified or destroyed in an unauthorized manner.
- 7. The property of being accessible and usable upon demand.
- 8. Qualify public key cryptography
- 10. Determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.
- 13. Verifying the identity or other attributes of an entity (user, process, or device).
- 14. A collection of computers compromised by malicious code and controlled across a network.
- 17. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
- 18. The assurance that the confidentiality of, and access to, certain information about an entity is protected.
- 21. Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
- 24. An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.