Unit-1: Security Architecture and OS Security Fundamentals

123456789101112131415
Across
  1. 3. This component manages hardware and software resources on a computer(13 letters)
  2. 5. A set of processes and technologies used to protect data in information systems(13 letters)
  3. 7. A type of security that focuses on protecting communication via emails (5,8 letters)
  4. 8. A structured collection of data or information that can be easily accessed, managed, and updated(8 letters)
  5. 10. The high-level description of how an OS interacts with hardware and software (9,7 letters)
  6. 11. These are categorized into tangible and intangible types, and have organizational value (5,5 letters)
  7. 12. Refers to the weaknesses in an operating system that can be exploited (14 letters)
  8. 14. A rule that enforces how passwords should be created and managed (8,8 letters)
  9. 15. A method of security that often involves layers like hardware, software, and processes (8,7 letters)
Down
  1. 1. The full form of DBMS (8,10 letters)
  2. 2. An individual element in an information system that has value and requires protection(5 letters)
  3. 4. A program that manages user permissions and roles in a system (4,13 letters)
  4. 6. Refers to the protection of devices and users connected through the web (7,8 letters)
  5. 9. The process of verifying the identity of a user(14 letters)
  6. 13. The overall design and structure of security controls in an organization(11 letters)