Dasabase security

1234567891011121314151617
Across
  1. 3. What are the 3 Principles of Information Security? (second one)
  2. 8. This process is critical for verifying that the user requesting database access is who they claim to be, typically involving methods like passwords or biometrics.
  3. 9. The most common form of authentication, where users must provide a secret word or phrase to gain access, though it is often vulnerable to attacks if not used alongside other security measures.
  4. 11. The act of scrambling data to prevent unauthorized access. A cryptographic technique that protects data by transforming it into an unreadable format, which can only be decoded with a special key.
  5. 13. What are the 3 Principles of Information Security? (third one)
  6. 14. An authentication method that relies on unique physical characteristics, such as fingerprints or facial recognition, to verify the identity of users.
  7. 16. What are the 3 Principles of Information Security? (first one) (This cybersecurity principle ensures that information is only accessible to those who are authorized to access it.)
Down
  1. 1. A security measure that requires users to verify their identity using two or more distinct methods, such as a password, a code sent to a phone, or a fingerprint scan.
  2. 2. Software used to protect against malicious software
  3. 4. Malicious software designed to harm or exploit any programmable device
  4. 5. A type of cyberattack where malicious code is inserted into SQL queries to access data.
  5. 6. Malicious software that can corrupt or steal data stored in a database.
  6. 7. Divides left hand operand by right hand operand and returns remainder
  7. 10. The process of controlling who has access to specific data in a database.
  8. 12. The term used to describe unauthorized access to a computer network with the intent to cause damage or theft
  9. 15. The primary language used to create web pages
  10. 17. Logical Operator that evaluates to true If any of the operands are true then condition becomes true in Python