Challenges of Securing Information
Across
- 3. concurrent lines of execution a shared resource
- 5. incorrectly configured
- 7. company does not provide support for their device
- 9. manufacturers security settings
- 10. wrong personnel making security decisions
- 12. deficiencies or weaknesses in software
- 13. that is that's not filtered or validated could cause a malicious action
- 14. has not been identified
- 15. widespread proliferation of devices
Down
- 1. options that provide limited security choices
- 2. devices not accounted for
- 4. account that may provide more access than necessary
- 6. error condition that allows an attacker access
- 8. a situation in which an attacker manipulates commonplace business processes that are routinely performed
- 11. no longer receives updates due to age