Is it possible to avoid risk?
Across
- 6. OSI layer that opens and closes conversation between two devices
- 8. Refer to an incident where unauthorized individual gain access to a system
- 9. Cryptography method that uses a pair of keys
- 10. refers to a security measure put in place to mitigate security risk
- 12. cloud services that is perfect for Application developers
- 14. The Indian bill for personal information protection,
Down
- 1. encrypted form of message
- 2. type of cybercrime that involves the use of QR codes
- 3. provider’s applications running on a cloud
- 4. cloud services available for general public
- 5. set of rules and standards that define how data is transmitted and received across a network.
- 7. / ware made for spying
- 11. Non-profit organization that dedicated to improving software security
- 13. European laws for privacy