My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

C-E Flashcards (2)

Security + SY0-601 Vocabulary List
Horizontales
A document that outlines what information the organization will maintain, and the length of time different categories of work product will be retained before destruction
The process that transforms data into a format where the original information can't be retrieved
The concept that sensitive personal information in database exposes an organization to risk in the event that information is stolen by an attacker
An oversight or data governance role within an organization and is responsible for ensuring the quality and fitness for purpose of the organization's data assets, including the metadata for those data assets.
Laws requiring the notification of data subjects after a known suspect breach
An attack that allows/ enables an attacker to jump out of the web root directory structure and into any other part of the filesystem hosted by the web server's host operating system
A DNS server that is configured to provide incorrect answers to specific DNS queries
A tool that is found on Linux systems and that is used to transfer data via URLs
Prevention of the spread of malicious code or other attacks
Verticales
A term that describes the actions an organization takes to resume normal operations after a disaster interrupts normal activity *What does this acronym stand for?*
An intrusion analysis model that focuses on adversaries, infrastructure, victims, and capabilities using a diamond shape to guide analysis through the connected vertices
An electronic document used to securely shares a private key with third parties bases on the assurance provided by a Certificate Authority (CA)
A centralized database of resources available to the network, much like a telephone directory for network services and assets
Evaluates the security of software in a runtime environment and is often the only option for organizations deploying applications written by someone else
Code that is in use in an organization, but nobody is responsible for the maintenance of that code, and in fact, nobody may even know where the original source files reside