CSE 167 Vocab / Terminology

12345678910111213
Across
  1. 4. the idea of adding defense in layers.
  2. 6. basic Linux file permissions include: read, write, and ____.
  3. 9. assumes people can get that information when they need it.
  4. 11. the type of key in asymmetric encryption that you use to decrypt a message when someone encrypts a message for you.
  5. 12. protection of computer systems and networks from information disclosure.
  6. 13. type of encryption where only one key is shared amongst sender and receiver.
Down
  1. 1. only authorized people have access to records.
  2. 2. verification of identity.
  3. 3. saving a copy of system data for restoration in the event that the system would need to be reset.
  4. 4. a system or place that must be protected.
  5. 5. only authorized people can modify data.
  6. 7. the practice of secure communications that allow only the sender and receiver to view a message's contents.
  7. 8. covers the protection of encryption systems.
  8. 10. the problem with cybersecurity today is that people use TRUST instead of ______.
  9. 12. come in four types: physical, technical, procedural, and legal.