Across
- 2. Structured collection of data organized into rows and columns, forming the foundation for database (5)
- 4. Process of restoring database functionality and data integrity after a security incident or failure (8)
- 5. Method of encoding data to prevent unauthorized access, ensuring confidentiality (10)
- 8. Unauthorized access or breach into a database system, posing a threat to its security (9)
- 10. Secret code used to authenticate and grant access to a database system, often paired with a username (8)
- 11. Unauthorized attempt to gain access to a database system or exploit its vulnerabilities (7)
- 12. Deceptive technique used to trick users into revealing sensitive information, often via fraudulent emails or websites (8)
Down
- 1. Unauthorized access or leakage of sensitive data from a database system, compromising its integrity (6)
- 3. Process of granting or denying access rights to users based on their authenticated identity (13)
- 6. Barrier preventing unauthorized access to a database system from external networks, controlling traffic (8)
- 7. Process of verifying user identity for accessing database resources (13)
- 9. The process of decoding encrypted data to make it readable, often requiring an encryption key (10)
