My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

I-O Flashcards (2)

Security + SY0-601 Vocabulary List
Horizontales
This is one example of resource exhaustion that happens if an application requests memory from the operating system, it will eventually no longer need that memory and should then return the memory to the operating system for other uses.
A protection that focuses on detecting loops and then disabling ports to prevent the loops from causing issues.
Risks that originate from within the organization.
An authentication protocol developed at MIT that uses tickets for authentication.
If the application does not perform authorization checks, the user may be permitted to view information that exceeds their authority by using an insecure direct object reference.
A form of input validation in which the developer describes the exact type of input that is expected from the user and then verifies that the input matches that specification before passing the input to other processes or servers.
A kind of file inclusion attacks that seeks to execute code stored in a file located elsewhere on the web server.
A real-time facility for verifying the validity of a digital certificate and confirming that it has not been revoked by the issuing certificate authority. *What does this acronym stand for?*
A letter written to document aspects of the relationship. *What does this acronym stand for?*
A network utility that can be used to read from and write to network connections, allowing many actions such as port scanning, shell access, and other purposes. Often called a network Swiss Army knife.
Passwords that can be used for only one attempted logon, after which they become invalid.
Verticales
A security policy that requires all employees to take vacations at least annually so that their work tasks and privileges can be audited and verified. This helps with detection of abuse, fraud, or negligence.
A notice that informs an organization that they must preserve data and records that might normally be destroyed or modified in the course of their normal operations.
Entrance vestibule that allows only one person at a time from entering a secure facility, preventing tailgating and piggybacking attacks.
Provides customers with the ability to place files in buckets and treat each file as an independent entity that may be accessed over the web or through the provider's APL
Procedures that describe how the organization will perform security monitoring activities, including the possible use of continuous monitoring technology.
Tools that are designed to detect the attempts to gain unauthorized access and prevent the attempts from becoming successful. *What does this acronym stand for?*
Web (or similar) services set up in a private network to be accessed internally only.
Open Standard for Authorization, a common method for authorizing websites or applications to access information.
An access control mechanism that uses security labels to regulate subject access to objects. *What does this acronym stand for?*