Set 1

12345678910
Across
  1. 2. Continuously observing systems for suspicious activity.
  2. 4. Strengthening systems by reducing vulnerabilities.
  3. 5. Converting data into a coded format to protect it.
  4. 7. Protecting personal or sensitive information by design.
  5. 8. Verifying the identity of users before granting access.
  6. 9. Recording system events for auditing and analysis.
  7. 10. Dividing networks or systems to limit security risks.
Down
  1. 1. Granting permissions based on user roles or rights.
  2. 3. Checking input data to prevent errors or attacks.
  3. 6. Designing systems to continue operating under attacks.