Across
- 1. Security flaw not yet discovered
- 3. Protection that's against unauthorized access
- 5. Security failure leading to compromise
- 8. Secure Data with secret code
- 10. Examination for compliance and security
- 11. Breach of system or network
- 14. String of letters for authentication
- 15. Identification using unique biological features
- 18. Regulatory adherence for date protection
Down
- 2. Confirm identity for system access
- 4. Software protecting against malicious code
- 6. Blocks unauthorized access to network
- 7. Breach or occurrence requiring investigation
- 9. Security gap needing protection
- 12. Deceptive attempt to acquire information
- 13. Unwanted software causing system damage
- 14. Code modification to improve security
- 16. Device or node in network
- 17. Application of scientific methods investigation
