Across
- 2. A security tactic in which a server or device only has installed on it what it needs to perform its prescribed role.
- 4. The act of passing control of a resource (such as an organizational unit) from one entity to another.
- 6. The form of authentication that uses devices such as retina scanners
- 7. A network security system and/or hardware device which controls any incoming and outgoing network traffic based on a set of rules provided by an administrator.
- 9. The act of verifying identification to an application or a system.
- 10. A system that traps attackers when they attempt to attack a network.
Down
- 1. A mechanism by which a log tracks who has logged on to a system and what has been accessed on the system.
- 3. The part of the CIA triangle that ensures data is accessible by those who need it
- 5. The part of the CIA triangle that involves ensuring data is accurate
- 8. The adding of cipher text to data to scramble the data to make it unreadable without a decryption key.
