Cryptober Puzzle #2

1234567891011121314
Across
  1. 3. The set of ways in which an adversary can enter a system and potentially cause damage
  2. 4. The act of exploiting a security vulnerability on the same day it becomes publicly known
  3. 7. The process of granting or denying specific requests for or attempts to obtain and use information and related information processing services
  4. 8. A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents.
  5. 10. a security control report developed by the American Institute of Certified Public Accountants
  6. 12. The process of verifying the identity or other attributes of an entity (user, process, or device)
  7. 14. An attack that prevents or impairs the authorized use of information system resources or services
Down
  1. 1. allows access based on the job title
  2. 2. Short for malicious software
  3. 5. A process of applying a mathematical algorithm against a set of data to produce a numeric value (a 'hash value') that represents the data
  4. 6. An unauthorized act of bypassing the security mechanisms of a network or information system
  5. 9. The unauthorized transfer of information from an information system
  6. 11. a browser setting that lets you browse privately by deleting history, site data, cookies, and data.
  7. 13. a service you can use to create and manage passwords. You only need a single master password to log in to the manager itself.