My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

C-E Flashcards (4)

Security + SY0-601 Vocabulary List
Horizontales
Software interface between hardware devices and the operating system
A document that describes the account the account lifecycle from provisioning through active use and decommissioning
A vector that uses a single-line format to convey the ratings of a vulnerability on all six of the metrics
A type of protection software that uses encryption to enforce copyright restrictions on digital media *This has been deployed across a variety of media types, including music, movies, and books* *What does this acronym stand for?*
The process of logging, auditing, and monitoring activities related to security controls and security mechanisms over time * This data is then used to identify agents of change whether objects, subjects, programs, communication pathway or even the network itself*
Data that is in transit over a network
The point at which the False Rejection Rate (FRR) and False Acceptance Rate (FAR) are equal *Sometimes called the Equal Error Rate (ERR)* *What does this acronym stand for?*
Data that is actively in use by a computer system
A software development phase that occurs when a product or system reaches the end of its life
Verticales
A tool that performs a lookup of an IP address to return a domain name, or a domain name to return an IP address, and looks up specific DNS information like MX (Mail Server), A, and other DNS records
Insurance policy designed to protect an organization against cybersecurity risks
A command-line tool that is used to find DNS servers and entries for a domain *It can be directed to query a specific DNS server or default to the DNS server the system on which it is running relies on*
In the context of a data processor, as defined by European Union data protection laws, the person or entity that controls processing of the data
The requirements of the level of protection required to preserve the Confidentiality, Integrity, and availability of an organization's information and systems
A specific term in the Diamond Model that refers to the adversary, capability, infrastructure, and victim (The vertices of the diamond)
An anonymous network created through encryption technology and often used for illicit activity
An individual or entity who processes personal data solely on behalf of the data controller (In legal terms, a natural or legal person)
The three key threats to cybersecurity efforts (Disclosure, Alteration, Denial)