Test Your Cybersecurity Knowledge

123456789
Across
  1. 3. authorization to perform some action on a system
  2. 6. automated recognition of individuals based on their biological and behavioral characteristics
  3. 8. guarding against improper information modification or destruction
  4. 9. A string of characters to verify access authorization
Down
  1. 1. assurance that information is not disclosed to unauthorized individuals or processes
  2. 2. confidentiality mode that transforms usable data into an unreadable form
  3. 3. scam to deceive people into revealing sensitive information
  4. 4. collection of values assigned to base measures, derived measures, and/or indicators
  5. 5. probability that a particular security threat will exploit a system vulnerability
  6. 7. software specifically designed to disrupt, damage, or gain unauthorized access to a computer system