CSC 200 Cybersecurity

123456789101112
Across
  1. 4. Deploying a security officer at the premises gate is an example of _____ control.
  2. 8. _____ is a type of attacker who wants to make a statement and perform targeted cyber attacks
  3. 9. Ensures transmission and storage of information in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the information.
  4. 10. Prevents either sender or receiver from denying a transmitted message.
  5. 12. Assures that the system works promptly and service is not denied to authorized users.
Down
  1. 1. _______ is the act of accessing information during transmission.
  2. 2. _________ unauthorized access and modification of an asset.
  3. 3. _________ means an information becomes lost, unavailable, or unusable
  4. 5. Preserving authorized restriction on information access and disclosure, including means for protection personal privacy and proprietary information
  5. 6. A weakness which allows an attacker to reduce a system's information assurance.
  6. 7. A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
  7. 11. Phishing and attachments target the _________ threat vector