Across
- 3. A process to verify the identity of users before granting access.
- 4. Unauthorized attempts to breach a system's security.
- 6. A malicious software designed to harm or exploit any programmable device.
- 8. A mechanism used to monitor and log all access attempts and actions.
- 10. The process of converting encrypted data back to readable form.
Down
- 1. The practice of encoding data to prevent unauthorized access.
- 2. Permissions granted to users to access specific resources based on their role.
- 5. A unique string of characters used to authenticate a user.
- 7. A method used to ensure data integrity and consistency in transactions.
- 9. Breach An act where sensitive data is stolen or exposed without authorization.
