Cyber Vocab 1.1

123456789101112131415161718192021222324252627
Across
  1. 1. A secret string of characters used for authentication.
  2. 5. Precomputed tables used to reverse cryptographic hash functions.
  3. 7. Ensuring that information and resources are accessible when needed.
  4. 9. An attack that attempts common passwords against many accounts.
  5. 10. When two different inputs produce the same hash output.
  6. 12. The combination of username and password or other authentication information.
  7. 13. An authentication method allowing a user to access multiple systems with one login.
  8. 14. A mix of dictionary and brute force attacks.
  9. 17. Authentication based on physical or behavioral characteristics - such as fingerprints or facial recognition.
  10. 20. The practice of protecting systems- networks and programs from digital attacks.
  11. 21. The process of verifying an individual’s identity before granting access.
  12. 22. A process of converting data into a fixed-size string - typically used for storing passwords securely.
  13. 23. The process of verifying the identity of a user or system.
  14. 24. An organized collection of structured information or data stored electronically.
  15. 25. A cryptographic attack that exploits the probability of hash collisions.
  16. 26. Ensuring that information is only accessible to those with proper authorization.
  17. 27. An incident where unauthorized access to data or systems occurs.
Down
  1. 2. A method of breaking passwords by systematically entering every word in a dictionary.
  2. 3. Tracking user actions and activities for auditing and monitoring.
  3. 4. A digital document used to prove ownership of a public key.
  4. 6. Physical cards with embedded chips used for secure authentication.
  5. 8. An attack where stolen credentials are used to gain unauthorized access.
  6. 11. Maintaining the accuracy and trustworthiness of data.
  7. 15. An attack that tries all possible combinations to guess a password.
  8. 16. Restricting access to resources based on user identity and permissions.
  9. 18. A step-by-step procedure for calculations or problem-solving.
  10. 19. A sequence of words used instead of a password for authentication.
  11. 20. A security model consisting of Confidentiality Integrity and Availability.