Across
- 4. Is the practice of developing and using coded algorithms to protect and mask transmitted information. Leads to the exposition of sensitive data in case of failure.
- 5. Is the fact that a data has not been modified, accidentally altered or deleted.
- 6. Is a computer or device on a network that manages network resources
- 9. Is an incorrect setting leading to vulnerabilities.
- 10. Is a type of attack where malicious code is inserted into a program.
Down
- 1. Is the combination of security software and appliance solutions to provide the infrastructure needed to protect an organization against cyber attacks.
- 2. Is a recording format that allows contextualization at a given moment.
- 3. Is a procedure used to certify the identity of a person or a computer.
- 7. Is the ability to ensure data security
- 8. Is an weakness that could be exploited or triggered by a threat source. Is classifies in CVE.
