Across
- 6. Encryption Standard :A symmetric-key algorithm for data encryption
- 8. communication from an unknown source as being from a known one.
- 9. Notification: A legal requirement to inform affected individuals after a data breach.
- 11. :A network of compromised computers controlled by a hacker.
- 12. Management:Processes for responding to and managing security incidents.
- 13. Security:Measures to protect physical assets and locations from unauthorized access.
- 14. vulnerability that is exploited before the vendor knows about it
- 15. list of approved entities allowed access to a system.
Down
- 1. a computer network into smaller parts for security.
- 2. :Information used to verify a user’s identity, like a password.
- 3. Authority (CA):An entity that issues digital certificates for secure communications.
- 4. Hash:A fixed-size string generated from data to ensure integrity.
- 5. Code:Software intended to harm or exploit any programmable device.
- 7. code injection technique used to attack databases.
- 10. state of being unidentifiable within a network or system.
