CROSSWORD
Across
- 5. A list of approved entities allowed access to a system.
- 6. A vulnerability that is exploited before the vendor knows about it
- 7. Processes for responding to and managing security incidents.
- 8. Information used to verify a user’s identity, like a password.
- 9. A network of compromised computers controlled by a hacker.
- 10. Disguising communication from an unknown source as being from a known one.
- 12. A code injection technique used to attack databases.
- 13. Measures to protect physical assets and locations from unauthorized access.
- 14. The state of being unidentifiable within a network or system.
- 15. A symmetric-key algorithm for data encryption
Down
- 1. A legal requirement to inform affected individuals after a data breach.
- 2. A fixed-size string generated from data to ensure integrity.
- 3. Dividing a computer network into smaller parts for security.
- 4. An entity that issues digital certificates for secure communications.
- 11. Software intended to harm or exploit any programmable device.