Across
- 5. The act of making sure every individual working with an information system has specific responsibilities for information assurance.
- 6. A process that gives a user permission to do certain things.
- 7. A three-pronged system of cybersecurity.
- 8. Ciphers that break down information into fixed-size blocks before encrypting it.
- 9. Software that displays unwanted advertising while running an application on your computer.
- 12. A program designed to perform a set of coordinated functions, jobs, or activities for the convenience of the user.
- 13. A guarantee of reliable access to information.
- 16. A device that helps join two separate computer networks together to allow for communication.
- 17. A guarantee that the message, transaction, or other exchange of information has shown its proof of identity.
Down
- 1. A security technique used to regulate who or what can utilize the resources of a computer system.
- 2. Encryption that uses two different keys, a public one for scrambling and a private one for unscrambling.
- 3. A process that measures how much information has been accessed or the amount of time spent on a session.
- 4. The governance, development, and maintenance of computer programs.
- 6. A process that identifies a user by asking them to enter some kind of valid information, like a password or user name.
- 7. The use of software and hardware in combination with certain procedural methods to protect applications from external threats.
- 9. One that is physically isolated from the internet and only able to pass data along via removable media.
- 10. A process or set of rules.
- 11. The use of human characteristics to distinctly identify individuals as themselves.
- 14. A process that keeps a system secure by physically isolating it from all unsecured networks.
- 15. An orderly search for nonvolatile data storage to load the OS.
