Foundations of Cyber Security I

1234567891011121314151617
Across
  1. 5. The act of making sure every individual working with an information system has specific responsibilities for information assurance.
  2. 6. A process that gives a user permission to do certain things.
  3. 7. A three-pronged system of cybersecurity.
  4. 8. Ciphers that break down information into fixed-size blocks before encrypting it.
  5. 9. Software that displays unwanted advertising while running an application on your computer.
  6. 12. A program designed to perform a set of coordinated functions, jobs, or activities for the convenience of the user.
  7. 13. A guarantee of reliable access to information.
  8. 16. A device that helps join two separate computer networks together to allow for communication.
  9. 17. A guarantee that the message, transaction, or other exchange of information has shown its proof of identity.
Down
  1. 1. A security technique used to regulate who or what can utilize the resources of a computer system.
  2. 2. Encryption that uses two different keys, a public one for scrambling and a private one for unscrambling.
  3. 3. A process that measures how much information has been accessed or the amount of time spent on a session.
  4. 4. The governance, development, and maintenance of computer programs.
  5. 6. A process that identifies a user by asking them to enter some kind of valid information, like a password or user name.
  6. 7. The use of software and hardware in combination with certain procedural methods to protect applications from external threats.
  7. 9. One that is physically isolated from the internet and only able to pass data along via removable media.
  8. 10. A process or set of rules.
  9. 11. The use of human characteristics to distinctly identify individuals as themselves.
  10. 14. A process that keeps a system secure by physically isolating it from all unsecured networks.
  11. 15. An orderly search for nonvolatile data storage to load the OS.