Across
- 2. An individual who uses technical skills to gain unauthorized access to systems or data.
- 5. The potential for loss or damage when a threat exploits a vulnerability.
- 7. Restricting access to resources based on user identity and permissions.
- 8. Double-check before you enter—password plus token.
- 9. Ensuring that data remains accurate, consistent, and unaltered.
Down
- 1. Writing software in a way that prevents security vulnerabilities.
- 3. Ensuring that systems and data are accessible when needed by authorized users.
- 4. Any circumstance or event with the potential to harm systems or data.
- 6. GDPR and HIPAA aim to ensure this
- 8. Gaining unauthorized physical access by following an authorized person into a secure area.
