March 2026
Across
- 1. A threat exploiting a flaw
- 3. Unauthorised entry to access attempt
- 6. Official organisation rules or guidelines
- 9. To label information based on sensitivity
- 10. Sensitive information that must be secured
- 11. Potential dangers to an organisation
- 12. Steps to reduce risk exposure
- 14. Protecting systems from malicious digital attacks (two words)
- 15. Ongoing observation of systems or environments
Down
- 2. Used to control physical entry (two words)
- 4. Inspections or evaluations of controls
- 5. Limiting who can enter a system or facility
- 7. Proof of who someone is
- 8. Measures to protect people, information and assets
- 13. Verifying a user's identity