CyberSecurity 2

123456789
Across
  1. 2. New team structure which combines application support and new work
  2. 6. IAM differentiates between Authenticate and ...
  3. 7. Non-human identity example
  4. 9. Category A3 in top 10 application weaknesses
Down
  1. 1. weakness in application
  2. 3. Failures related to hardcoded passwords
  3. 4. faster method of code delivery
  4. 5. We differentiate betn User and ...
  5. 8. ISO27000 has 14 different categories of ...