Security+ Crossword Puzzle #1

123456789101112131415161718192021222324252627
Across
  1. 3. indicates exposure to the chance of damage or loss
  2. 6. the countermeasures put in place to avoid, mitigate, or counteract risks
  3. 7. administrator has discretion to allow or not allow access
  4. 11. malicious software that is intended to track and report back on system usage
  5. 12. the security approach of blocking unauthorized access or attacks before they occur
  6. 13. the act of determining if a user has tried to access unauthorized data
  7. 14. any technique used to exploit a vulnerability
  8. 15. process of validating credentials
  9. 17. an attacker accessing your computer system without authorization
  10. 19. process of tracking and recording system activities and resource access
  11. 23. Top Secret, Secret, Confidential
  12. 25. any potential damage to an asset
  13. 26. data that has been encoded with a cipher and is unreadable
Down
  1. 1. self-replicating piece of malicious code that spreads without attching itself to different files
  2. 2. physical or virtual objects that store authentication information
  3. 4. ensuring that who sent the data remains associated and cannot deny sending it
  4. 5. software that displays or downloads advertisements
  5. 8. any condition that leaves a system open to harm
  6. 9. _____ bomb remains dormant until a specific condition occurs
  7. 10. self-replicating piece of malicious code that spreads by attaching itself to different files
  8. 16. process of determining rights and privileges
  9. 18. malicious software that takes full or partial control of a system at the lowest levels
  10. 20. _____ management is a systematic way of reviewing and approving changes
  11. 21. the act of recovering vital data from a system that has crashed, been compromised, or damaged
  12. 22. rule, system, or mechanism used to encrypt or decrypt data
  13. 24. practice of examining logs
  14. 27. access is controlled by a user's role