Across
- 2. In computer security, risk is a measure of the extent to which an entity is threatened by a potential event, such as a data breach or cyberattack. It is often calculated as a function of the likelihood of the event occurring and the potential negative impact.
- 5. The process of implementing controls and measures to reduce the impact of a potential security threat or vulnerability. The goal is to lower risk to an acceptable level.
- 7. The assurance that a party in a communication or transaction cannot later deny having sent or received the data. It provides proof of the origin and integrity of the data.
- 9. A foundational model for cybersecurity that guides the development of security systems. The three pillars are Confidentiality, Integrity, and Availability.
- 11. In the context of technology and cybersecurity, accessible means that systems, tools, and information can be used and understood by people with a wide range of abilities and disabilities.
- 12. The guarantee that systems and data are accessible and available to authorized users when needed.
- 13. The principle of keeping sensitive information private and ensuring that access is restricted to only authorized individuals.
Down
- 1. A network security device that not only detects malicious activity but also actively blocks or prevents it. It is often placed directly in the path of network traffic.
- 3. The assurance that data is trustworthy, accurate, and has not been improperly altered, modified, or destroyed by an unauthorized user.
- 4. A security tool that monitors network traffic or system activity for known malicious signatures or suspicious behavior. An IDS alerts administrators to potential threats but does not block them directly.
- 6. A program or set of programs designed to prevent, detect, and remove malicious software, such as viruses, worms, and trojans.
- 8. The process of verifying the claimed identity of a user, device, or other entity before granting access to a system or network.
- 10. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks.
