crossword

123456789101112131415
Across
  1. 6. Encryption Standard :A symmetric-key algorithm for data encryption
  2. 8. communication from an unknown source as being from a known one.
  3. 9. Notification: A legal requirement to inform affected individuals after a data breach.
  4. 11. :A network of compromised computers controlled by a hacker.
  5. 12. Management:Processes for responding to and managing security incidents.
  6. 13. Security:Measures to protect physical assets and locations from unauthorized access.
  7. 14. vulnerability that is exploited before the vendor knows about it
  8. 15. list of approved entities allowed access to a system.
Down
  1. 1. a computer network into smaller parts for security.
  2. 2. :Information used to verify a user’s identity, like a password.
  3. 3. Authority (CA):An entity that issues digital certificates for secure communications.
  4. 4. Hash:A fixed-size string generated from data to ensure integrity.
  5. 5. Code:Software intended to harm or exploit any programmable device.
  6. 7. code injection technique used to attack databases.
  7. 10. state of being unidentifiable within a network or system.