My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

1-C Flashcards (3)

Security + SY0-601 Vocabulary List
Horizontales
The risk that a security breach causes an organization to run afoul of legal or regulatory requirements
Cryptographic algorithms that use two different keys (One key to encrypt & another to decrypt) * Also called public key cryptography)
The process by which investigators document the handling of evidence from collection through use in court
A process that the organization will follow for accepting new assets (such as computers and mobile devices) into inventory, tracking those assets over their lifetime, and properly disposing of them at the end of their useful life
The firm that offer cloud computing services to their customers
The intermediaries that provide the connectivity that allows the delivery of cloud services from providers to consumers
Cloud delivery model in which the infrastructure is shared by organizations with something in common
The organization and individuals who purchase cloud services from cloud service providers
A metric that describes how an attacker would exploit a vulnerability
Verticales
Gap controls that fill in the coverage between other types of vulnerability mitigation techniques (Where there are holes in coverage, we compensate for them)
A type of attack that systematically tries all possibilities (for example, a password) until achieving a successful result
A policy used to instruct workers how and why to clean off their desk at the end of each work period. In relation to security such a policy has a primary goal of reducing disclosure of sensitive information
A process designed to uncover any criminal activity or other past behavior that may indicate that a potential employee poses undetected risk to the organization
A flood of unwanted broadcast network traffic