18CSE455T-Database Security and Privacy Crossword2

123456789101112
Across
  1. 2. Structured collection of data organized into rows and columns, forming the foundation for database (5)
  2. 4. Process of restoring database functionality and data integrity after a security incident or failure (8)
  3. 5. Method of encoding data to prevent unauthorized access, ensuring confidentiality (10)
  4. 8. Unauthorized access or breach into a database system, posing a threat to its security (9)
  5. 10. Secret code used to authenticate and grant access to a database system, often paired with a username (8)
  6. 11. Unauthorized attempt to gain access to a database system or exploit its vulnerabilities (7)
  7. 12. Deceptive technique used to trick users into revealing sensitive information, often via fraudulent emails or websites (8)
Down
  1. 1. Unauthorized access or leakage of sensitive data from a database system, compromising its integrity (6)
  2. 3. Process of granting or denying access rights to users based on their authenticated identity (13)
  3. 6. Barrier preventing unauthorized access to a database system from external networks, controlling traffic (8)
  4. 7. Process of verifying user identity for accessing database resources (13)
  5. 9. The process of decoding encrypted data to make it readable, often requiring an encryption key (10)