March 2026

123456789101112131415
Across
  1. 1. A threat exploiting a flaw
  2. 3. Unauthorised entry to access attempt
  3. 6. Official organisation rules or guidelines
  4. 9. To label information based on sensitivity
  5. 10. Sensitive information that must be secured
  6. 11. Potential dangers to an organisation
  7. 12. Steps to reduce risk exposure
  8. 14. Protecting systems from malicious digital attacks (two words)
  9. 15. Ongoing observation of systems or environments
Down
  1. 2. Used to control physical entry (two words)
  2. 4. Inspections or evaluations of controls
  3. 5. Limiting who can enter a system or facility
  4. 7. Proof of who someone is
  5. 8. Measures to protect people, information and assets
  6. 13. Verifying a user's identity