CIA Triad
Across
- 4. Organizing data based on sensitivity.
- 7. Protecting information from unauthorized access.
- 9. Converting data into a secure format.
- 12. Control over who can view or use data.
- 14. Assessing security practices and compliance.
- 16. Creating a unique representation of data.
- 18. Additional resources to ensure availability.
- 19. Responsible handling of data.
- 20. Guaranteeing information is available when needed.
Down
- 1. Following regulations and standards.
- 2. An occurrence that may compromise security.
- 3. Events that hinder access to data.
- 5. Verifying data integrity through calculations.
- 6. Ensuring data remains unaltered and trustworthy.
- 8. Informing users about security practices.
- 10. Potential causes of data breaches or loss.
- 11. Creating copies of data for restoration.
- 13. Actions taken to minimize risks or impacts.
- 15. Verifying the source and integrity of data.
- 17. Confirming user identity before access.