Across
- 3. The main circuit board that connects all components of a computer.
- 4. The abbreviation for the security measure where more than one verification method is used to access a system.
- 7. Type of software that allows the operating system to communicate with and control hardware components.
- 8. This abbreviation is used for the type of highspeed, temporary memory used for processing tasks.
- 9. The practice that guarantees that authorized users have access to information and systems when needed.
- 11. Protection of information systems from theft, damage, or disruption.
- 13. The process of converting data into a code to prevent unauthorized access.
- 14. key, A cryptographic key used in asymmetric encryption that must be kept secret.
- 16. An electronic device that processes data according to instructions.
- 20. The study and practice of securing communication through encoding techniques.
Down
- 1. Malicious software designed to damage or gain unauthorized access to systems.
- 2. The practice that ensures information is secret, secure and accessible only to those authorized to have access.
- 5. The abbreviation for the security measure that encrypts internet connections for secure data transmission over a public network.
- 6. Type of software programmed into read-only memory to provide low-level instructions that control hardware devices.
- 10. The practice that assures that data is accurate and has not been altered or tampered with.
- 12. This abbreviation is used for the specialized processor that handles rendering of images, video and animation.
- 15. point, A device that allows wireless devices to connect to a wired network.
- 17. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- 18. The physical or logical arrangement of network devices and connections.
- 19. A security test used to verify that a user is human and not a bot.
