Across
- 3. puts up a barrier in between internal network and outside networks
- 8. Determining the privileges to resources, objects, or data
- 11. stop people from uploading or forwarding important information in an not safe way
- 12. determining the privileges of a user
- 13. cryptographic hash functions published by NIST
- 14. Confidentiality, Integrity, Availability
- 15. encrypts the connection from an endpoint to a network
- 17. combines multiple layers of defenses at the edge and in the network
- 19. blocks incoming attacks and controls outbound messages to prevent the loss of data
- 20. countermeasures to avoid or fight against security risks
Down
- 1. collections of equal and non-equal encryption algorithms
- 2. determines physical location
- 4. protects a wireless network
- 5. hiding information in blocks or within images
- 6. control web use, block threats, and deny access to malicious websites
- 7. automatically sees activities that are not normal
- 9. commonly used hash function that makes 128-bit hash value
- 10. protection of information or information resources
- 16. the only protection for the data when the defense fails
- 18. Access, Authentication, Authorization
