Security

1234567891011121314151617
Across
  1. 3. physical or logical subnet that separates an internal network from the internet
  2. 4. It is usually better to lose functionality rather than security.
  3. 7. Hides the data being transferred between parties.
  4. 8. The most common method of tracking a customer accessing an organization’s website is by assigning a unique
  5. 10. Analyzes running code while simulating outside, or “black box” attacks.
  6. 11. is the point where data transfers from the intranet to the internet and vice-versa.
  7. 12. Verifies that the data has not been forged or tampered with.
  8. 13. is a set of algorithms that specifies details such as which shared encryption keys, or session keys, will be used for that particular session.
  9. 15. This type of ethical hacker attempts to break into the application in order to detect vulnerabilities and find potential attack vectors with the aim of protecting the system from a real attack
  10. 16. critical data should be maintained in the event of catastrophic system failure.
  11. 17. is at the root of many security issues.
Down
  1. 1. is the monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communication.
  2. 2. Confidentiality, integrity, and availability
  3. 3. aims to detect security holes from day one in order to prevent security issues
  4. 5. This principle dictates that each task, process, or user is granted the minimum rights required to perform its job.
  5. 6. an attacker can maliciously inject JavaScript into an application running on the victim’s browser.
  6. 9. This requires developers to check their code as they are writing it to ensure that security issues are not being introduced during development.
  7. 14. ensure that a user is who they say they are.