ISec Terminology

12345678910
Across
  1. 3. Confirming the correctness of the claimed identity
  2. 4. Attack on Confidentiality
  3. 6. Unintentional risk
  4. 7. Easy access to the compromised system
  5. 9. Gathering information about the target
  6. 10. Technique to estaplish attack
Down
  1. 1. Approval,permission, or empowerment for someone or something to do something
  2. 2. Attack on Availability
  3. 5. Weakness in the information system
  4. 6. first line of defense
  5. 8. Strong symmetric cipher