CS UNIT-1 PUZZLE

123456789101112131415
Across
  1. 2. A security barrier that controls network traffic.
  2. 3. The act of guaranteeing information is protected.
  3. 4. Information safe from accidental or intentional disclosure.
  4. 6. Exploit a vulnerability intentionally or accidentally.
  5. 9. The process of converting data into a secret code.
  6. 10. An electronic document used to prove identity online.
  7. 13. The process of verifying who you are.
  8. 15. A type of encryption using only one shared key.
Down
  1. 1. Gaps in a security program.
  2. 5. Ensuring data has not been altered or tampered with.
  3. 7. Information is available to authorized users when needed.
  4. 8. An object representing a user's security context in Windows.
  5. 11. Act that uses vulnerability to do damage to systems.
  6. 12. The process of a computer running a program's instructions.
  7. 14. The art and science of secret communication.