My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

C-E Flashcards (5)

Security + SY0-601 Vocabulary List
Horizontales
A plain-text file stored on your machine that contains information about you (and your preferences) for use by a database server *This can also be used by malicious websites to track user activities*
Devices or software that allow or block traffic based on content rules
Algorithms applied to data that are designed to ensure Confidentiality, Integrity, Authentication, and/or Nonrepudiation
The process that removes the ability to link data back to an individual thus reducing its security
A protocol used to assign TCP/IP configuration settings to systems upon bootup *DHCP supports centralized control and management of network addressing* *What does this acronym stand for?*
Running a script routine on a user's machine from a website without their permission
Stored data that resides on hard drives, on tapes, in the cloud, or on other storage media
A key principle in social engineering that uses the fact that people tend to want to do what others are doing to persuade them to take an action
Verticales
The requirements of the level of protection required to preserve the Confidentiality, Integrity, and Availability of an organization's information and systems
Standardized software package that includes all code and libraries to facilitate execution on any hardware and operating systems supporting the same containerization platform
The unintended disruption of an unauthorized user's legitimate access to information
Looking through trash for clues, often in the form of paper scraps to find users' passwords and other pertinent information
A seven-step process of mapping attacks from their beginning to end
An attack that is focused on the visiting user's web browser more so than the website being visited. *Its main purpose is to trick the user or the user's browser into performing actions they did not intend or would not have authorized* *What does this acronym stand for?*
DevOps model that includes security as a core component