CyberCrossWord

1234567891011121314151617181920212223242526272829
Across
  1. 2. Any mechanisms that bypasses a normal security check; it may allow unauthorized access to functionality
  2. 4. The process of verifying an identity by or for a system
  3. 11. Policy A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources
  4. 13. Code embedded in a program that copies itself and performs unwanted function
  5. 15. The output of an encryption algorithm; the encrypted form of a message or data
  6. 18. Assures that a system performs its intended function in an unimpaired manner
  7. 19. Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself
  8. 22. A potential security harm to an asset
  9. 23. An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result
  10. 24. Preserving authorized information access, or disclosure
  11. 26. The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity
  12. 27. Assures that a system performs its intended function in an unimpaired manner
  13. 28. A random value that is concatenated with a password
  14. 29. A decoy system designed to lure a potential attacker away from critical systems
Down
  1. 1. Confidentiality, integrity, and availability
  2. 3. Assures that information and programs are changed only in a specified and authorized manner
  3. 5. An attempt to alter system resources or affect their operation
  4. 6. Attack An attempt to learn or make use of information from the system that does not affect system resources
  5. 7. Guarding against improper information modification or destruction
  6. 8. A program that takes over another computer and it's used to launch attacks
  7. 9. Program that can replicate itself and send copies from computer to computer across network connections
  8. 10. Assures that individuals control what information related to them may be collected, stored, and to whom is shared to
  9. 12. Assures that private information is disclosed to unauthorized individuals
  10. 13. Weakness in an information system
  11. 14. Function used to protect passwords that are stored in the local database
  12. 16. A plastic card that can store and process data
  13. 17. Assures that systems work promptly and service is not denied to authorized users
  14. 20. A procedure whereby two communicating parties can cooperate to acquire a shared secret key
  15. 21. Key A temporary encryption key used between two principals
  16. 25. The conversion of plaintext data into unintelligible form