CIS 101 Participation

123456789101112131415161718
Across
  1. 1. Security flaw not yet discovered
  2. 3. Protection that's against unauthorized access
  3. 5. Security failure leading to compromise
  4. 8. Secure Data with secret code
  5. 10. Examination for compliance and security
  6. 11. Breach of system or network
  7. 14. String of letters for authentication
  8. 15. Identification using unique biological features
  9. 18. Regulatory adherence for date protection
Down
  1. 2. Confirm identity for system access
  2. 4. Software protecting against malicious code
  3. 6. Blocks unauthorized access to network
  4. 7. Breach or occurrence requiring investigation
  5. 9. Security gap needing protection
  6. 12. Deceptive attempt to acquire information
  7. 13. Unwanted software causing system damage
  8. 14. Code modification to improve security
  9. 16. Device or node in network
  10. 17. Application of scientific methods investigation