Security
Across
- 3. ask questions or seek information.
- 4. Intentional destruction or damage.
- 7. of rules or procedures
- 10. To monitor or observe closely.
- 11. Genuine or legitimate.
- 13. let's use Risky doesn't fit, let's use Assessdoesn't fit the bill, let's use Threats
- 15. use Probe doesn't fit let's us Inquire
- 16. To confirm or verify authenticity.
- 18. Protected from threats or risks.
- 19. let's use Accreditdoesn't fit let's use Validate
Down
- 1. of assets and personnel.
- 2. keep safe from harm or damage.
- 5. Potential occurrences that could cause harm.
- 6. To give permission or approval.
- 8. Unauthorized gathering of confidential information.
- 9. Thorough background check.
- 12. Verification of trustworthiness for access.
- 14. Measure to protect against harm or damage.
- 15. To examine closely for defects or issues.
- 17. ,To ensure compliance with laws or rules.