My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

E-I Flashcards (3)

Security + SY0-601 Vocabulary List
Horizontales
An example of platform-as-a service (PaaS) computing that allows customers to upload their own code functions to the provider; the provider will then execute those functions on a scheduled basis, in response to events, and/or on demand. *What does this acronym stand for?*
A measurement of the amount of damage or loss that could be or will be caused if a potential threat is realized.
A cryptographic analysis or attack that looks for repetition of letters in an encrypted message and compares that with the statistics of letter usage for a specific language, such as the frequency of the letters E, T, A, 0 , N, R, I, S, and H in the English language.
Software that manages the access of virtual machines to underlying hardware resources
A form of computer-management device that controls industrial processes and machines. ICSs are used across a wide range of industries, including manufacturing, fabrication, electricity generation and distribution, water distribution, sewage processing, and oil refining. *What does this acronym stand for?*
A type of proxy that is placed between clients and servers, and that accepts requests from clients and sends them forward to servers.
A framework that contains a series of documents designed to describe the organization's cybersecurity program.
European Union law that provides a single, harmonized law covering data security and privacy. *What does this acronym stand for?*
A key principle in social engineering that relies on you liking the individual or even the organization the individual is claiming to represent.
U.S. law passed in 1999 that eased the strict governmental barriers between financial institutions and created new security and privacy requirements. *What does this acronym stand for?*
Risks that originate from a source outside the organization.
Verticales
A crypto processor used to manage/store digital encryption keys, accelerate cryptographic operations, support faster digital signatures, and improve authentication. *What does this acronym stand for?*
Privacy law governing the student educational records maintained by educational institutions in the United States who receive certain types of funding from the U.S. Department of Education. *What does this acronym stand for?*
A document that provides high-level authority and guidance for the security program.
The process of converting plain text that is readable by anyone into encrypted text or ciphertext. This ciphertext will be unreadable to anyone able to intercept it.
The act of extinguishing (or attempting to extinguish) a fire.
A concept that uses Internet of Things (loT) gateway devices that are located in close physical proximity to the sensors.
A technique that measures how a person walks to identify them.
A complete copy of data contained on the protected device on the backup media.
Web (or similar) services set up in a private network to be accessed internally and by select external entities, such as vendors and suppliers.