social media data collection & unit 2 vocab

123456789101112131415161718
Across
  1. 3. A tool monitoring system activities and network traffic for policy violations or malicious activity and lets the administrator know when something suspicious happens.
  2. 6. The possibility for damage and harm to data and digital systems, which outcomes from a threat making use of a vulnerability.
  3. 7. When maintaining the accuracy and preventing unauthorized modification
  4. 12. Implementing measures to reduce the risk of a cyberattack or to make it less impactful if it does happen.
  5. 13. A cybersecurity model which defines the primary principles of info security and stands for Confidentiality, Integrity, and Availability
  6. 14. The process that verifies a user’s identity and prove who they claim to be.
  7. 15. A process in which verifies that a user is who they claim to be.
  8. 16. All people can securely and independently understand and use security tools, training, and services without creating new risks.
  9. 17. making sure data and systems are accessible when needed
  10. 18. Protecting your info from unauthorized access
Down
  1. 1. A program that is designed to prevent, remove,and prevent malicious malware like viruses, ransomware, etc from computers.
  2. 2. A tool monitoring network traffic in real time, detecting and blocking malicious behavior like malware automatically.
  3. 4. It depends on physical cables for data transmission instead of wireless singles to prevent unauthorized access through remote.
  4. 5. Provides valid proof that a party was involved in a digital communication or transaction so they can’t deny it later.
  5. 8. networks It uses light instead of electricity providing a more secure physical foundation for data transmission.
  6. 9. Keeping sensitive and important data on a device that is disconnected to the internet or a network.
  7. 10. the process that requires two distinct forms of identification to prove who they are when they log in in their account to add extra protection.
  8. 11. A network security device or software that monitors and controls incoming and outcoming network traffic.