Across
- 1. Secret word/phrase for system access
- 4. Real estate loan product
- 6. Rate charged on loans or paid on deposits
- 8. Gramm-Leach-Bliley Act acronym
- 10. Adherence to laws and regulations
- 12. Converting data into secret code to protect it
- 13. Examination of financial records and controls
- 15. Social engineering attack via fake emails
Down
- 2. Verifying user identity before granting access
- 3. Service Organization Control report type
- 5. Malicious software designed to harm systems
- 7. Weakness in system that can be exploited
- 9. Account for customer funds
- 11. Third-party security/system report
- 14. Network security barrier blocking unauthorized access
