CIA Triad

1234567891011121314151617181920
Across
  1. 4. Organizing data based on sensitivity.
  2. 7. Protecting information from unauthorized access.
  3. 9. Converting data into a secure format.
  4. 12. Control over who can view or use data.
  5. 14. Assessing security practices and compliance.
  6. 16. Creating a unique representation of data.
  7. 18. Additional resources to ensure availability.
  8. 19. Responsible handling of data.
  9. 20. Guaranteeing information is available when needed.
Down
  1. 1. Following regulations and standards.
  2. 2. An occurrence that may compromise security.
  3. 3. Events that hinder access to data.
  4. 5. Verifying data integrity through calculations.
  5. 6. Ensuring data remains unaltered and trustworthy.
  6. 8. Informing users about security practices.
  7. 10. Potential causes of data breaches or loss.
  8. 11. Creating copies of data for restoration.
  9. 13. Actions taken to minimize risks or impacts.
  10. 15. Verifying the source and integrity of data.
  11. 17. Confirming user identity before access.