Module 2 Review

12345678
Across
  1. 3. these methods are used to prove that a user is who they say they are
  2. 6. the process of taking plaintext data and converting it to ciphertext
  3. 7. these methods are used to allow each account access to only necessary functions for their job
  4. 8. hardware or software that provides a barrier between connected networks/devices to enforce security policies
Down
  1. 1. an intrusion _____ system sits in the flow of data and can take active measures to stop an attack while it is happening
  2. 2. device that determines the best path for forwarding data to its destination
  3. 3. a computer or system is physically isolated and incapable of connection
  4. 4. a computer or device that runs centralized applications or manages network resources
  5. 5. the three pillars of information security