What is Cyber Security: Vocabulary Review

12345678910111213141516
Across
  1. 3. the practice of isolating resources and controlling access to them through APIs or strict interfaces
  2. 4. a design technique that separates the functionality of a program into independent, interchangeable components.
  3. 8. the process of breaking down complex cybersecurity models into abstract components to simplify and clearly define their security roles.
  4. 10. the practice of protecting data from unauthorized access, disclosure, or alteration
  5. 11. the protection of data from unauthorized modification or deletion.
  6. 12. a cybersecurity technique that protects processes from each other on an operating system.
  7. 13. a design principle that emphasizes the importance of simplicity in cyber security systems and logics
  8. 14. the practice of concealing information within other data, structures, or media to prevent unauthorized access.
  9. 15. the principle of granting users only the minimum level of access or permissions necessary to perform their job functions
  10. 16. the practice of collecting, processing, and storing only the minimum amount of data needed to complete a specific task.
Down
  1. 1. creating secondary safety nets that bolster network security and mitigate single points of failure throughout the network.
  2. 2. the ability to reliably access and use information in a timely manner.
  3. 5. a cybersecurity strategy that uses multiple layers of security measures to protect an organization's assets.
  4. 6. a process that separates data, processes, and administrative tasks into logical groupings, or domains.
  5. 7. the practice of reducing unnecessary complexity and focusing on what's essential
  6. 9. a way of looking at the world from the perspective of a hacker