Internet Security

123456789101112131415
Across
  1. 2. protection of actual equipment
  2. 7. people accessing the information is who they say they are
  3. 8. data has not been altered in an unauthorized manner
  4. 9. only provide access to information necessary to perform the job at hand
  5. 11. Access Control List
  6. 14. starting point in developing an overall security plan
  7. 15. message gets encrypted regardless, only authorized users can decrypt it
Down
  1. 1. information can be accessed and modified by authorized individuals in an appropriate timeframe
  2. 3. sender and receiver have keys, very risky
  3. 4. restrict access to authorized individuals
  4. 5. Inspects and stops packets of information that don’t apply to a strict set of rules
  5. 6. easiest to break in regards to security
  6. 10. important information should be stored in seperate location
  7. 12. scrambles information during transmission or storage
  8. 13. A good way to remember role-based access control