Crash Course Computer Science Cybersecurity

123456789101112131415
Across
  1. 4. After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer.-____ permission allows a user to run a file, like a program
  2. 6. For organizations with users at different levels of access it’s especially important for Access Control Lists to be _____ to ensure secrecy, integrity and availability
  3. 7. How a system is secured what on who it’s being secured against
  4. 8. Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what
  5. 11. Good developers should take the approach that, not if, but when their programs are compromised, the damage should be limited and contained, and not let it compromise other things running on the computer. This principle is called what
  6. 12. To differentiate between right and wrong people, we use ____the process by which a computer understands who it’s interacting with.Generally, there are three types, each with their own pros and cons: What you know authentication is based on knowledge of a secret that should be known only by the real user and the computer
  7. 13. What is a set of techniques to protect the secrecy, integrity and availability of computer systems and data against threats
  8. 15. After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -_____permission allows a user to see the contents of a file
Down
  1. 1. So,security experts suggest using two or more forms of authentication for important Accounts. This is known as two-factor or ______ authentication
  2. 2. They typically require _________, so it’s much harder for remote attackers to gain access. What you are authentication is based on... you! You authenticate by presenting yourself to the computer
  3. 3. What you know and what you have authentication have the nice property of being ______ either correct or incorrect
  4. 5. the best we have right now is a process called Independent Verification and ____
  5. 9. After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -____ permission allows a user to modify the contents
  6. 10. To achieve these three general goals, security experts start with a specification of who your “enemy” is, at an abstract level, called a what
  7. 13. Another issue with biometric authentication is it what
  8. 14. Operating Systems attempt to _____ applications by giving each their own block of memory that others programs can’t touch