Test V1

12345678910
Across
  1. 4. Is the practice of developing and using coded algorithms to protect and mask transmitted information. Leads to the exposition of sensitive data in case of failure.
  2. 5. Is the fact that a data has not been modified, accidentally altered or deleted.
  3. 6. Is a computer or device on a network that manages network resources
  4. 9. Is an incorrect setting leading to vulnerabilities.
  5. 10. Is a type of attack where malicious code is inserted into a program.
Down
  1. 1. Is the combination of security software and appliance solutions to provide the infrastructure needed to protect an organization against cyber attacks.
  2. 2. Is a recording format that allows contextualization at a given moment.
  3. 3. Is a procedure used to certify the identity of a person or a computer.
  4. 7. Is the ability to ensure data security
  5. 8. Is an weakness that could be exploited or triggered by a threat source. Is classifies in CVE.