|
"LO1 - Key words - continued": HTML5 Crossword |
Across3. Services determine which resources users can access, along with the operations that users can perform., this can also control when a user has access to a specific resource. (13)
6. One of the Three Principles of Security (9)
7. One of the Three Cybersecurity safeguards (3 words) and relates to; procedures, and guidelines that enable the citizens of the cyber world to stay safe and follow good practices. (8,3,9)
14. (3 words) A hardware based technology appliance that is installed within the network faculties, attempts to stop or block suspicious activity. (9,10,6)
15. One of the Three states of data, at… (4)
16. One of the Three states of data, in…. (7)
17. One of the Three states of data, in…. (7)
|
|
Down1. (3 words) A hardware based technology appliance that is installed within the network faculties, which alerts administrator to suspicious activity. (9,9,6)
2. (2 words) systems that typically include three design principles: eliminate single points of failure, provide for reliable crossover, and detect failures as they occur. (4,12)
4. One of the Three Principles of Security (12)
5. is the accuracy, consistency, and trustworthiness of data during its entire life cycle. (9)
8. Verifies the identity of a user to prevent unauthorized access. Users prove their identity with a username or I.D. (14)
9. One of the Three Cybersecurity safeguards and relates to; Aware and knowledgeable about their world and the dangers that threaten their world. (6)
10. One of the Three Principles of Security (15)
11. keeps track of what users do, including what they access, the amount of time they access resources, and any changes made. (10)
12. (acronym) uses multiple hard drives in an array, which is a method of combining multiple disks so that the operating system sees them as a single disk, this provides improved performance and fault tolerance. (4)
13. One of the Three Cybersecurity safeguards and relates to; devices, and products available to protect information systems and fend off cyber criminals. (12)
|
new
edit
share
pdf:puzzle
pdf:answers
Create an editable copy
ACROSS
3. Services determine which resources users can access, along with the operations that users can perform., this can also control when a user has access to a specific resource. (13)
6. One of the Three Principles of Security (9)
7. One of the Three Cybersecurity safeguards (3 words) and relates to; procedures, and guidelines that enable the citizens of the cyber world to stay safe and follow good practices. (8,3,9)
14. (3 words) A hardware based technology appliance that is installed within the network faculties, attempts to stop or block suspicious activity. (9,10,6)
15. One of the Three states of data, at… (4)
16. One of the Three states of data, in…. (7)
17. One of the Three states of data, in…. (7)
DOWN
1. (3 words) A hardware based technology appliance that is installed within the network faculties, which alerts administrator to suspicious activity. (9,9,6)
2. (2 words) systems that typically include three design principles: eliminate single points of failure, provide for reliable crossover, and detect failures as they occur. (4,12)
4. One of the Three Principles of Security (12)
5. is the accuracy, consistency, and trustworthiness of data during its entire life cycle. (9)
8. Verifies the identity of a user to prevent unauthorized access. Users prove their identity with a username or I.D. (14)
9. One of the Three Cybersecurity safeguards and relates to; Aware and knowledgeable about their world and the dangers that threaten their world. (6)
10. One of the Three Principles of Security (15)
11. keeps track of what users do, including what they access, the amount of time they access resources, and any changes made. (10)
12. (acronym) uses multiple hard drives in an array, which is a method of combining multiple disks so that the operating system sees them as a single disk, this provides improved performance and fault tolerance. (4)
13. One of the Three Cybersecurity safeguards and relates to; devices, and products available to protect information systems and fend off cyber criminals. (12)

|