|
"LO1 - Key words - continued": HTML5 Crossword |
Across2. Services determine which resources users can access, along with the operations that users can perform., this can also control when a user has access to a specific resource. (13)
4. keeps track of what users do, including what they access, the amount of time they access resources, and any changes made. (10)
5. (2 words) systems that typically include three design principles: eliminate single points of failure, provide for reliable crossover, and detect failures as they occur. (4,12)
8. One of the Three Principles of Security (9)
9. One of the Three states of data, in…. (7)
13. (3 words) A hardware based technology appliance that is installed within the network faculties, which alerts administrator to suspicious activity. (9,9,6)
15. One of the Three Cybersecurity safeguards and relates to; Aware and knowledgeable about their world and the dangers that threaten their world. (6)
16. (acronym) uses multiple hard drives in an array, which is a method of combining multiple disks so that the operating system sees them as a single disk, this provides improved performance and fault tolerance. (4)
17. One of the Three states of data, at… (4)
|
|
Down1. Verifies the identity of a user to prevent unauthorized access. Users prove their identity with a username or I.D. (14)
3. One of the Three Principles of Security (15)
6. (3 words) A hardware based technology appliance that is installed within the network faculties, attempts to stop or block suspicious activity. (9,10,6)
7. One of the Three Cybersecurity safeguards (3 words) and relates to; procedures, and guidelines that enable the citizens of the cyber world to stay safe and follow good practices. (8,3,9)
10. One of the Three Principles of Security (12)
11. One of the Three states of data, in…. (7)
12. One of the Three Cybersecurity safeguards and relates to; devices, and products available to protect information systems and fend off cyber criminals. (12)
14. is the accuracy, consistency, and trustworthiness of data during its entire life cycle. (9)
|
new
edit
share
pdf:puzzle
pdf:answers
Create an editable copy
ACROSS
2. Services determine which resources users can access, along with the operations that users can perform., this can also control when a user has access to a specific resource. (13)
4. keeps track of what users do, including what they access, the amount of time they access resources, and any changes made. (10)
5. (2 words) systems that typically include three design principles: eliminate single points of failure, provide for reliable crossover, and detect failures as they occur. (4,12)
8. One of the Three Principles of Security (9)
9. One of the Three states of data, in…. (7)
13. (3 words) A hardware based technology appliance that is installed within the network faculties, which alerts administrator to suspicious activity. (9,9,6)
15. One of the Three Cybersecurity safeguards and relates to; Aware and knowledgeable about their world and the dangers that threaten their world. (6)
16. (acronym) uses multiple hard drives in an array, which is a method of combining multiple disks so that the operating system sees them as a single disk, this provides improved performance and fault tolerance. (4)
17. One of the Three states of data, at… (4)
DOWN
1. Verifies the identity of a user to prevent unauthorized access. Users prove their identity with a username or I.D. (14)
3. One of the Three Principles of Security (15)
6. (3 words) A hardware based technology appliance that is installed within the network faculties, attempts to stop or block suspicious activity. (9,10,6)
7. One of the Three Cybersecurity safeguards (3 words) and relates to; procedures, and guidelines that enable the citizens of the cyber world to stay safe and follow good practices. (8,3,9)
10. One of the Three Principles of Security (12)
11. One of the Three states of data, in…. (7)
12. One of the Three Cybersecurity safeguards and relates to; devices, and products available to protect information systems and fend off cyber criminals. (12)
14. is the accuracy, consistency, and trustworthiness of data during its entire life cycle. (9)

|