DATA SECURITY

12345678910
Across
  1. 3. A process to verify the identity of users before granting access.
  2. 4. Unauthorized attempts to breach a system's security.
  3. 6. A malicious software designed to harm or exploit any programmable device.
  4. 8. A mechanism used to monitor and log all access attempts and actions.
  5. 10. The process of converting encrypted data back to readable form.
Down
  1. 1. The practice of encoding data to prevent unauthorized access.
  2. 2. Permissions granted to users to access specific resources based on their role.
  3. 5. A unique string of characters used to authenticate a user.
  4. 7. A method used to ensure data integrity and consistency in transactions.
  5. 9. Breach An act where sensitive data is stolen or exposed without authorization.