Across
- 2. Key A temporary encryption key used between two principals
- 6. The process of verifying an identity by or for a system
- 7. Program that can replicate itself and send copies from computer to computer across network connections
- 13. Function used to protect passwords that are stored in the local database
- 15. Code embedded in a program that copies itself and performs unwanted function
- 16. A decoy system designed to lure a potential attacker away from critical systems
- 18. Assures that information and programs are changed only in a specified and authorized manner
- 20. Weakness in an information system
- 22. The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity
- 24. Preserving authorized information access, or disclosure
- 26. Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself
- 29. A plastic card that can store and process data
- 30. A procedure whereby two communicating parties can cooperate to acquire a shared secret key
Down
- 1. Assures that a system performs its intended function in an unimpaired manner
- 3. Assures that systems work promptly and service is not denied to authorized users
- 4. A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources
- 5. The output of an encryption algorithm; the encrypted form of a message or data
- 8. An attempt to alter system resources or affect their operation
- 9. Assures that private information is disclosed to unauthorized individuals
- 10. Guarding against improper information modification or destruction
- 11. A program that takes over another computer and it's used to launch attacks
- 12. Any mechanisms that bypasses a normal security check; it may allow unauthorized access to functionality
- 14. Assures that individuals control what information related to them may be collected, stored, and to whom is shared to
- 17. Attack An attempt to learn or make use of information from the system that does not affect system resources
- 19. Confidentiality, integrity, and availability
- 21. A random value that is concatenated with a password
- 23. An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result
- 25. Assures that a system performs its intended function in an unimpaired manner
- 27. A potential security harm to an asset
- 28. The conversion of plaintext data into unintelligible form
