My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

1-C Flashcards (5)

Security + SY0-601 Vocabulary List
Horizontales
An exercise that puts technologists against one another in attempt to attack a system and achieve a specific goal, such as stealing a sensitive file
Cybersecurity adversary characterized by a sophisticated series of related attacks taking place over an extended period of time
An opening left in a program application (usually by the developer) that allows additional access to data
Intelligence information, typically from a commercial vendor that is provided only to specific groups
A dollar value assigned to an asset based on actual cost and nonmonetary expenses
A way to confirm the authenticity of their code to end users
Determination as to whether evidence is acceptable to be used in a court of law
Verticales
A method of detecting abnormal or malicious events by looking for abnormal occurrences or violations of specified rules *Commonly used by intrusion detection systems (IDSs) and/or intrusion prevention systems (IPSs)
A policy used to instruct workers how and why to clean off their desk at the end of each work period
Formal reviews of an organization's security program or specific compliance issues conducted on behalf of a third party
Technology that scrutinizes API request for security issues
The comprehensive evaluation mode in support of the accreditation process of the technical and nontechnical security features of an IT system and other safeguards to establish the extent to which particular design and implementation meet a specified security requirements
The three essential security principles of Confidentiality, Integrity, and Availability
The IEEE standard that defines port-based security for network access control *IEEE = Institute of Electrical and Electronics Engineers*
The organizations that offer ancillary products or services that support or integrate with the offerings of a cloud service provider
A system that hides the true meaning of a message. It uses a variety of techniques to alter and/or rearrange the characters or words of a message to achieve confidentiality
Encryption technology used in WPA2 protocol