SECURITY ENGINEERING-SCM
Across
- 4. physical connection between elements
- 5. system vulnerability
- 8. key feature in SCM
- 10. determines the sw system scope
- 13. possible loss or harm
- 14. making part of system unavailable
- 15. is accepted version of a sw configuration item
Down
- 1. inserting false information
- 2. Maintaining secrecy of information
- 3. A weakness in a system
- 6. An exploitation of a system's vulnerability
- 7. are used to evaluate the state of the product
- 9. increases productivity with minimal mistakes
- 11. One of the SCM participant
- 12. size oriented sw metric