Across
- 3. The set of ways in which an adversary can enter a system and potentially cause damage
- 4. The act of exploiting a security vulnerability on the same day it becomes publicly known
- 7. The process of granting or denying specific requests for or attempts to obtain and use information and related information processing services
- 8. A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents.
- 10. a security control report developed by the American Institute of Certified Public Accountants
- 12. The process of verifying the identity or other attributes of an entity (user, process, or device)
- 14. An attack that prevents or impairs the authorized use of information system resources or services
Down
- 1. allows access based on the job title
- 2. Short for malicious software
- 5. A process of applying a mathematical algorithm against a set of data to produce a numeric value (a 'hash value') that represents the data
- 6. An unauthorized act of bypassing the security mechanisms of a network or information system
- 9. The unauthorized transfer of information from an information system
- 11. a browser setting that lets you browse privately by deleting history, site data, cookies, and data.
- 13. a service you can use to create and manage passwords. You only need a single master password to log in to the manager itself.
