CROSSWORD

123456789101112131415
Across
  1. 5. A list of approved entities allowed access to a system.
  2. 6. A vulnerability that is exploited before the vendor knows about it
  3. 7. Processes for responding to and managing security incidents.
  4. 8. Information used to verify a user’s identity, like a password.
  5. 9. A network of compromised computers controlled by a hacker.
  6. 10. Disguising communication from an unknown source as being from a known one.
  7. 12. A code injection technique used to attack databases.
  8. 13. Measures to protect physical assets and locations from unauthorized access.
  9. 14. The state of being unidentifiable within a network or system.
  10. 15. A symmetric-key algorithm for data encryption
Down
  1. 1. A legal requirement to inform affected individuals after a data breach.
  2. 2. A fixed-size string generated from data to ensure integrity.
  3. 3. Dividing a computer network into smaller parts for security.
  4. 4. An entity that issues digital certificates for secure communications.
  5. 11. Software intended to harm or exploit any programmable device.