My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

O-R Flashcards (3)

Security + SY0-601 Vocabulary List
Horizontales
A phishing practice that uses malicious code on compromised systems to send unsuspected users to malicious websites
Physical security measures used to ensure that wiring and cables remain secure and that breaches of security are reported to responsible parties
Data item that includes medical records maintained by health-care providers and other organizations that are subject to the Health Insurance Portability and Accountability Act (HIPPA) *What does this acronym stand for?
A list of passwords that have already been used
A document that outlines privacy commitments
The amount of time in which you think you can feasibly recover function in the event of a disruption *What does this acronym stand for?
The order in which systems and services should be restored in the event of a disaster to ensure proper restoration and to avoid service dependency issues
A code review process that relies on email or other distribution methods to distribute code for review
A program that ensures that relevant patches are applied to systems
A phase of the penetration test that occurs as the attacker uses the initial system compromise to gain access to other systems on the target network
An agile software development technique that places two developers at one workstation
Verticales
A standard that prescribes specific security controls for merchants who handle credit card transactions and service providers who assist merchants with these transactions
Requirements created by regulations and laws applicable to an organization
A Windows tool that traces the route to a destination while providing information about latency and packet loss
The risk to the organization's ability to carry out its day-to-day functions
The concept that information should only be used for the purpose that it was originally collected and that was consented to by the data subjects
A cloud delivery model available to others
In the context of security, a detailed step-by-step how-to document describing the actions necessary to implement a specific mechanism, control, or solution