Across
- 2. The most common form of authentication, where users must provide a secret word or phrase to gain access, though it is often vulnerable to attacks if not used alongside other security measures.
- 5. What are the 3 Principles of Information Security? (third one)
- 8. A data type that is simply a sequence of characters hash character for comments
- 10. An authentication method that relies on unique physical characteristics, such as fingerprints or facial recognition, to verify the identity of users.
- 11. Malicious software that can corrupt or steal data stored in a database.
- 14. Software used to protect against malicious software
- 19. Logical Operator that evaluates to false If condition evaluates to true.
- 20. The process of controlling who has access to specific data in a database.
- 22. What are the 3 Principles of Information Security? (first one) (This cybersecurity principle ensures that information is only accessible to those who are authorized to access it.)
- 23. if its boolean expression is true, then executes a block of code
- 24. The act of scrambling data to prevent unauthorized access. A cryptographic technique that protects data by transforming it into an unreadable format, which can only be decoded with a special key.
- 25. A _______ statement allows us to execute a statement or group of statements multiple times
Down
- 1. The term used to describe unauthorized access to a computer network with the intent to cause damage or theft
- 3. Logical Operator that evaluates to true If any of the operands are true then condition becomes true in Python
- 4. Merges the string representations of elements in sequence seq into a string, with separator string
- 6. This process is critical for verifying that the user requesting database access is who they claim to be, typically involving methods like passwords or biometrics.
- 7. A type of cyberattack where malicious code is inserted into SQL queries to access data.
- 9. A function that returns the smallest item in an iterable
- 12. A security measure that requires users to verify their identity using two or more distinct methods, such as a password, a code sent to a phone, or a fingerprint scan.
- 13. keeps executing as long as True
- 15. What are the 3 Principles of Information Security? (second one)
- 16. The primary language used to create web pages
- 17. Malicious software designed to harm or exploit any programmable device
- 18. Logical Operator that evaluates to true If both the operands are true then condition becomes true. Modulus Divides left hand operand by right hand operand and returns remainder
- 21. How many times will the following while loop run? x = 5 while x > 0: x -= 1