Across
- 3. indicates exposure to the chance of damage or loss
- 6. the countermeasures put in place to avoid, mitigate, or counteract risks
- 7. administrator has discretion to allow or not allow access
- 11. malicious software that is intended to track and report back on system usage
- 12. the security approach of blocking unauthorized access or attacks before they occur
- 13. the act of determining if a user has tried to access unauthorized data
- 14. any technique used to exploit a vulnerability
- 15. process of validating credentials
- 17. an attacker accessing your computer system without authorization
- 19. process of tracking and recording system activities and resource access
- 23. Top Secret, Secret, Confidential
- 25. any potential damage to an asset
- 26. data that has been encoded with a cipher and is unreadable
Down
- 1. self-replicating piece of malicious code that spreads without attching itself to different files
- 2. physical or virtual objects that store authentication information
- 4. ensuring that who sent the data remains associated and cannot deny sending it
- 5. software that displays or downloads advertisements
- 8. any condition that leaves a system open to harm
- 9. _____ bomb remains dormant until a specific condition occurs
- 10. self-replicating piece of malicious code that spreads by attaching itself to different files
- 16. process of determining rights and privileges
- 18. malicious software that takes full or partial control of a system at the lowest levels
- 20. _____ management is a systematic way of reviewing and approving changes
- 21. the act of recovering vital data from a system that has crashed, been compromised, or damaged
- 22. rule, system, or mechanism used to encrypt or decrypt data
- 24. practice of examining logs
- 27. access is controlled by a user's role
