My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

R-S Flashcards (3)

Security + SY0-601 Vocabulary List
Horizontales
A set of policies designed to reduce the risk of fraud and prevent other loss in an organization by preventing the same person from holding two privileges that are sensitive when used together
A feature that defines permissible network traffic
SOC reports define two SOC levels and three types of SOC report (SOC 1,2, and 3) that provide information about controls
An attack that exploits a vulnerability but rather than tricking a user's browser into visiting a URL, they trick a server into visiting a URL based on user supplied input
A key principle used for social engineering in scenarios that make something look more desirable because it may be the last one available
A regulation that applies to the financial records of U.S. publicly traded companies and requires that those companies have a strong degree of assurance for the IT systems that score and process those records
A formall assessment of wireless signal strength, quality, and interference using an RF signal detector
Verticales
An attack that captures portions of a session to play back later to convince a host that it is still talking to the original connection
An evaluation of how much risk you and your organization are willing to take
A security technique that provides a security boundary for application from interacting with other applications *Antimalware applications use this technique to test unknown applications
The implementation of safeguards and countermeasures to eliminate vulnerabilities or block threats
A software development lifecycle model that moves through four phases (Identification, Design, Build, and Evaluation) in a repeated cycle until completed
A phishing technique that uses phishing via SMS (text) messages and vishing or phishing via telephone
A feature of Unified Extensible Firmware Interface (UEFI) that aims to protect the operating environment of the local system by preventing the load or installing of device drivers or an operating system that is not signed by a preapproved digital certificate
A network that is controlled and configured using code and software *What does this acronym stand for?