Across
- 3. these methods are used to prove that a user is who they say they are
- 6. the process of taking plaintext data and converting it to ciphertext
- 7. these methods are used to allow each account access to only necessary functions for their job
- 8. hardware or software that provides a barrier between connected networks/devices to enforce security policies
Down
- 1. an intrusion _____ system sits in the flow of data and can take active measures to stop an attack while it is happening
- 2. device that determines the best path for forwarding data to its destination
- 3. a computer or system is physically isolated and incapable of connection
- 4. a computer or device that runs centralized applications or manages network resources
- 5. the three pillars of information security
