Across
- 2. Restricting access to the subject based on sensitivity/ Need to know.
- 6. Is the hacker/attacker's clever manipulation of the natural human tendency to trust to obtain information that will allow him to gain unauthorized access to a valued system
- 9. Is a technique used to retrieve information that could be used to carry out an attack or gain access to a computer network from disposed items.
- 12. An object should only have the rights and privileges necessary to perform its task with no additional permissions.
- 13. Ensures that only valid users are admitted
- 14. Is a way of storing the same data in different places on multiple hard disks or solid-state drives (SSDs) to protect data in the case of a drive failure
Down
- 1. Protection from unauthorized disclosure.
- 3. Is a set of techniques used to protect networks, programs and data from attack, damage, or unauthorized access.
- 4. Is a cyberattack vector that takes advantage of an unknown or unaddressed security flaw in computer software, hardware or firmware. "Zero day" refers to the fact that the software or device vendor has zero days to fix the flaw because malicious actors can already use it to access vulnerable systems.
- 5. Solutions we can implement in the enterprise.
- 7. Full identity theft packages to commit financial fraud.
- 8. For a given task, more than 1 person should be involved.
- 10. Do not rely on a single brand of security device.
- 11. The cost of safeguard or protection should not be greater than the value of the asset.