Cybersecurity Fundamentals Chapter 4 Part 2

12345678910111213141516
Across
  1. 4. uses at least two methods of verification.
  2. 8. restricts the actions that a subject can perform on an object.
  3. 10. keeps something from happening.
  4. 12. conceals data in another file such as a graphic, audio, or other text file.
  5. 13. return to restore back to a state of Confidentially, integrity and availability.
  6. 14. passwords, passphases, or pins are examples of something that the user knows.
  7. 16. opposite of a reward.
Down
  1. 1. use and practice of data masking and steganography techniques.
  2. 2. counteracts something that is undesirable.
  3. 3. smart cards and security key fobs are examples of something that users have in their possession.
  4. 5. replaces data with authentic looking values to apply anonymity to the data records.
  5. 6. to make up for something.
  6. 7. unique physical characteristics, such as a fingerprint, retina, or voice, that identifies a specific user is called biometrics.
  7. 9. uses access control lists (ACLs) to help determine whether to grant access.
  8. 11. derives from substitution set from the same column of data that a user wants to mask.
  9. 15. is the act or process of noticing or discovering something.