My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Security+ Midterm

Teacher: Rhonda Heath
Horizontales
Ensures that data is not modified or tampered with.
Data, applications, systems, networks and physical space (as defined in access control).
A type of access control used for short-term repairs.
An instance of being exposed to losses through an attack.
Something you are.
A successful, intentional and malicious attack on information and/or systems.
Mechanisms that restrict physical access, such as perimeter security, site location, locks, etc.
The likelihood of an attack taking advantage of a vulnerability.
(in passwords) A password created by the system, usually two or more unrelated words divided by symbols on the keyboard.
Policies that describe accepted practices.
(in passwords) A password based on something you know.
Provides proof that data came from a specific sender.
A type of access control used to search for details about an attack or an attacker.
Any potential danger to the confidentiality, integrity or availability of information or systems.
Access to resources based on job descriptions.
Somewhere you are.
The process of checking identification credentials against permissions to grant access to information or systems.
Access to resources based or location or geography.
Users, applications, or processes that need access to objects (as defined in access control).
Verticales
Access to resources based on categories or classification of data.
Something you have.
Something you are; a physical characteristic unique to a specific user.
Allowing access to resources by specifically naming the authorized users
Access to resources based on identity.
Computer mechanisms that restrict access, such as encryption, one-time passwords, access control lists and firewalls.
Absence or weakness of a safeguard that could be exploited.
Producing proof that you are who you say you are.
Keeping data protected from users who are not authorized to see it.
Someone who causes actual or potential losses through malicious means.
(in passwords) A password created by a user and overseen by an administrator, to be used long-term.
Access to resources based on rules.