Across
- 5. A weakness in a system that could be exploited to cause harm to the system
- 7. The unintended loss of service of an information system
- 8. A set of security goals in cyber security
- 11. The unintended change of data belonging to an information system
- 13. A quality of data which refers to how useful the data is
- 14. A quality of data in which the owner or creator is correct
Down
- 1. A countermeasure which prevents a threat from exploiting a vulnerability
- 2. A quality of security in which data and services are accessable to the authorized parties
- 3. Software, data, or commands which take advantage of a vulnerability to cause unintended behavior in a system
- 4. The unintended release of confidential information
- 6. A quality of security in which data is only modified by those authorized to do so, and in a way in which the data was intended to be modified
- 8. A quality of security in which data is only viewable by authorized individuals
- 9. Negative consequences of a threat
- 10. A quality of data which states who physically controls the media on which data is stored
- 12. A person or environmental actor that could cause hard to the system
