Information Security Challenge

123456789
Across
  1. 2. An individual who uses technical skills to gain unauthorized access to systems or data.
  2. 5. The potential for loss or damage when a threat exploits a vulnerability.
  3. 7. Restricting access to resources based on user identity and permissions.
  4. 8. Double-check before you enter—password plus token.
  5. 9. Ensuring that data remains accurate, consistent, and unaltered.
Down
  1. 1. Writing software in a way that prevents security vulnerabilities.
  2. 3. Ensuring that systems and data are accessible when needed by authorized users.
  3. 4. Any circumstance or event with the potential to harm systems or data.
  4. 6. GDPR and HIPAA aim to ensure this
  5. 8. Gaining unauthorized physical access by following an authorized person into a secure area.