CyberSecurity 2
Across
- 2. New team structure which combines application support and new work
- 6. IAM differentiates between Authenticate and ...
- 7. Non-human identity example
- 9. Category A3 in top 10 application weaknesses
Down
- 1. weakness in application
- 3. Failures related to hardcoded passwords
- 4. faster method of code delivery
- 5. We differentiate betn User and ...
- 8. ISO27000 has 14 different categories of ...