Across
- 2. It is a situation that involves danger
- 4. It is the decision of no inverting on security not even if the system is vulnerable
- 5. It is the risk during the transmission or movement of information from one computer to another
- 6. It is the possibility of something unwelcome or unpleasant happening
Down
- 1. It is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks
- 3. It is information resting in a hard drive, server
- 4. It is the action of assessing someone or something