Across
- 3. What are the 3 Principles of Information Security? (second one)
- 8. This process is critical for verifying that the user requesting database access is who they claim to be, typically involving methods like passwords or biometrics.
- 9. The most common form of authentication, where users must provide a secret word or phrase to gain access, though it is often vulnerable to attacks if not used alongside other security measures.
- 11. The act of scrambling data to prevent unauthorized access. A cryptographic technique that protects data by transforming it into an unreadable format, which can only be decoded with a special key.
- 13. What are the 3 Principles of Information Security? (third one)
- 14. An authentication method that relies on unique physical characteristics, such as fingerprints or facial recognition, to verify the identity of users.
- 16. What are the 3 Principles of Information Security? (first one) (This cybersecurity principle ensures that information is only accessible to those who are authorized to access it.)
Down
- 1. A security measure that requires users to verify their identity using two or more distinct methods, such as a password, a code sent to a phone, or a fingerprint scan.
- 2. Software used to protect against malicious software
- 4. Malicious software designed to harm or exploit any programmable device
- 5. A type of cyberattack where malicious code is inserted into SQL queries to access data.
- 6. Malicious software that can corrupt or steal data stored in a database.
- 7. Divides left hand operand by right hand operand and returns remainder
- 10. The process of controlling who has access to specific data in a database.
- 12. The term used to describe unauthorized access to a computer network with the intent to cause damage or theft
- 15. The primary language used to create web pages
- 17. Logical Operator that evaluates to true If any of the operands are true then condition becomes true in Python