Challenges of Securing Information

123456789101112131415
Across
  1. 3. concurrent lines of execution a shared resource
  2. 5. incorrectly configured
  3. 7. company does not provide support for their device
  4. 9. manufacturers security settings
  5. 10. wrong personnel making security decisions
  6. 12. deficiencies or weaknesses in software
  7. 13. that is that's not filtered or validated could cause a malicious action
  8. 14. has not been identified
  9. 15. widespread proliferation of devices
Down
  1. 1. options that provide limited security choices
  2. 2. devices not accounted for
  3. 4. account that may provide more access than necessary
  4. 6. error condition that allows an attacker access
  5. 8. a situation in which an attacker manipulates commonplace business processes that are routinely performed
  6. 11. no longer receives updates due to age