Across
- 7. determining the privileges of a user
- 10. protection of information or information resources
- 11. commonly used hash function that makes 128-bit hash value
- 12. Access, Authentication, Authorization
- 13. puts up a barrier in between internal network and outside networks
- 16. collections of equal and non-equal encryption algorithms
- 18. combines multiple layers of defenses at the edge and in the network
- 20. determines physical location
Down
- 1. stop people from uploading or forwarding important information in an not safe way
- 2. automatically sees activities that are not normal
- 3. cryptographic hash functions published by NIST
- 4. control web use, block threats, and deny access to malicious websites
- 5. the only protection for the data when the defense fails
- 6. Confidentiality, Integrity, Availability
- 8. protects a wireless network
- 9. blocks incoming attacks and controls outbound messages to prevent the loss of data
- 14. hiding information in blocks or within images
- 15. Determining the privileges to resources, objects, or data
- 17. countermeasures to avoid or fight against security risks
- 19. encrypts the connection from an endpoint to a network
