Unit 2 vocabolar

12345678910111213
Across
  1. 2. In computer security, risk is a measure of the extent to which an entity is threatened by a potential event, such as a data breach or cyberattack. It is often calculated as a function of the likelihood of the event occurring and the potential negative impact.
  2. 5. The process of implementing controls and measures to reduce the impact of a potential security threat or vulnerability. The goal is to lower risk to an acceptable level.
  3. 7. The assurance that a party in a communication or transaction cannot later deny having sent or received the data. It provides proof of the origin and integrity of the data.
  4. 9. A foundational model for cybersecurity that guides the development of security systems. The three pillars are Confidentiality, Integrity, and Availability.
  5. 11. In the context of technology and cybersecurity, accessible means that systems, tools, and information can be used and understood by people with a wide range of abilities and disabilities.
  6. 12. The guarantee that systems and data are accessible and available to authorized users when needed.
  7. 13. The principle of keeping sensitive information private and ensuring that access is restricted to only authorized individuals.
Down
  1. 1. A network security device that not only detects malicious activity but also actively blocks or prevents it. It is often placed directly in the path of network traffic.
  2. 3. The assurance that data is trustworthy, accurate, and has not been improperly altered, modified, or destroyed by an unauthorized user.
  3. 4. A security tool that monitors network traffic or system activity for known malicious signatures or suspicious behavior. An IDS alerts administrators to potential threats but does not block them directly.
  4. 6. A program or set of programs designed to prevent, detect, and remove malicious software, such as viruses, worms, and trojans.
  5. 8. The process of verifying the claimed identity of a user, device, or other entity before granting access to a system or network.
  6. 10. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks.