Information Security

1234567891011121314151617
Across
  1. 4. The process of determining what rights and privileges a particular entity has.
  2. 5. Occurs when the system is vulnerable to attacks
  3. 8. Potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability
  4. 9. Anything that can exploit a vulnerability, intentionally or accidentally and obtain, damage or destroy an asset
  5. 10. A technique that is used to exploit a vulnerability.
  6. 11. Encoded message
  7. 14. The process of determining and assigning privileges to various resources, objects or data
  8. 15. Authentication schemes based on the identification of individuals by their physical characteristics.
  9. 16. The action of stopping any form of attack from happening
  10. 17. Info used in cipher only to sender/receiver
Down
  1. 1. Gaps in a security program that can be exploited by threats to gain unauthorized access to an asset
  2. 2. The science of hiding information
  3. 3. Unencrypted information
  4. 6. Occurs when a user/machine is discovered trying to access unauthorized data
  5. 7. A physical or virtual object such as a smart card, ID badge that store authentication information
  6. 10. The part of accounting in which a security professional examines logs of what was recorded
  7. 12. The process of retrieving vital data from a crashed system or data storage device
  8. 13. The process of tracking recording system activities and resource access
  9. 14. People, property, and information that needs to be protected