Crear juego
Jugar Ruleta de Palabras
A
B
C
D
E
F
H
I
L
M
P
R
S
T
U
V
W
Z
Starts with  
A
A security technique that regulates who or what can view or use resources in a computing environment (note: 2 words)
Starts with  
B
The physical or behavioral human characteristics to that can be used to digitally identify a person to grant access to systems, devices or data.
Starts with  
C
The need to ensure that information is disclosed only to those who are authorized to view it (also part of the CIA triad).
Starts with  
D
What most individuals and organizations would want to protect the most; especially if it's considered private and confidential.
Starts with  
E
Cryptographic transformation of data (called "plaintext") into a form (called "cipher text") that conceals the data's original meaning to prevent it from being known or used.
Starts with  
F
The most common part of the human body used in biometrics identification
Starts with  
H
The most common permanent storage medium within a personal computer used for backup. (note: 2 words)
Starts with  
I
An adverse network event in an information system or network or the threat of the occurrence of such an event.
Starts with  
L
The recommended _________________ of a password is not less than 8 characters.
Starts with  
M
Short for malicious software.
Starts with  
P
a high-level document that defines the organization's vision concerning security, goals, needs, scope, and responsibilities.
Starts with  
R
A type of malware that is a form of extortion and usually targeted towards users' mobile devices.
Starts with  
S
A ________________ is an electronic badge that includes a magnetic strip or chip that can record and replay a set key. Smurf
Starts with  
T
A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
Starts with  
U
The short name, usually meaningful in some way, associated with a particular computer user.
Starts with  
V
A flaw or weakness that can be used to attack a system or organization
Starts with  
W
A type of malware commonly spread through email systems due to a user's mistake in clicking on attachments that are unsafe.
Starts with  
Z
A computer connected to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse.