ISec Terminology
Across
- 3. Confirming the correctness of the claimed identity
- 4. Attack on Confidentiality
- 6. Unintentional risk
- 7. Easy access to the compromised system
- 9. Gathering information about the target
- 10. Technique to estaplish attack
Down
- 1. Approval,permission, or empowerment for someone or something to do something
- 2. Attack on Availability
- 5. Weakness in the information system
- 6. first line of defense
- 8. Strong symmetric cipher