Across
- 4. The process of determining what rights and privileges a particular entity has.
- 5. Occurs when the system is vulnerable to attacks
- 8. Potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability
- 9. Anything that can exploit a vulnerability, intentionally or accidentally and obtain, damage or destroy an asset
- 10. A technique that is used to exploit a vulnerability.
- 11. Encoded message
- 14. The process of determining and assigning privileges to various resources, objects or data
- 15. Authentication schemes based on the identification of individuals by their physical characteristics.
- 16. The action of stopping any form of attack from happening
- 17. Info used in cipher only to sender/receiver
Down
- 1. Gaps in a security program that can be exploited by threats to gain unauthorized access to an asset
- 2. The science of hiding information
- 3. Unencrypted information
- 6. Occurs when a user/machine is discovered trying to access unauthorized data
- 7. A physical or virtual object such as a smart card, ID badge that store authentication information
- 10. The part of accounting in which a security professional examines logs of what was recorded
- 12. The process of retrieving vital data from a crashed system or data storage device
- 13. The process of tracking recording system activities and resource access
- 14. People, property, and information that needs to be protected
