CyberCrossWord

123456789101112131415161718192021222324252627282930
Across
  1. 2. Key A temporary encryption key used between two principals
  2. 6. The process of verifying an identity by or for a system
  3. 7. Program that can replicate itself and send copies from computer to computer across network connections
  4. 13. Function used to protect passwords that are stored in the local database
  5. 15. Code embedded in a program that copies itself and performs unwanted function
  6. 16. A decoy system designed to lure a potential attacker away from critical systems
  7. 18. Assures that information and programs are changed only in a specified and authorized manner
  8. 20. Weakness in an information system
  9. 22. The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity
  10. 24. Preserving authorized information access, or disclosure
  11. 26. Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself
  12. 29. A plastic card that can store and process data
  13. 30. A procedure whereby two communicating parties can cooperate to acquire a shared secret key
Down
  1. 1. Assures that a system performs its intended function in an unimpaired manner
  2. 3. Assures that systems work promptly and service is not denied to authorized users
  3. 4. A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources
  4. 5. The output of an encryption algorithm; the encrypted form of a message or data
  5. 8. An attempt to alter system resources or affect their operation
  6. 9. Assures that private information is disclosed to unauthorized individuals
  7. 10. Guarding against improper information modification or destruction
  8. 11. A program that takes over another computer and it's used to launch attacks
  9. 12. Any mechanisms that bypasses a normal security check; it may allow unauthorized access to functionality
  10. 14. Assures that individuals control what information related to them may be collected, stored, and to whom is shared to
  11. 17. Attack An attempt to learn or make use of information from the system that does not affect system resources
  12. 19. Confidentiality, integrity, and availability
  13. 21. A random value that is concatenated with a password
  14. 23. An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result
  15. 25. Assures that a system performs its intended function in an unimpaired manner
  16. 27. A potential security harm to an asset
  17. 28. The conversion of plaintext data into unintelligible form