Across
- 5. A potential cause of an unwanted incident that may result in harm.
- 6. A standard for managing customer data based on five trust service principles.
- 9. Proactively searching for signs of malicious activity.
- 10. A solution that collects and analyzes security data in real time.
- 11. An attack that manipulates a database query through input fields.
- 12. Protocols for securing communications over a network.
- 15. Encryption using the same key for both encryption and decryption.
Down
- 1. Information about threats and threat actors used to inform decisions.
- 2. Manipulating people into divulging confidential information.
- 3. A service that encrypts your internet connection for privacy and security.
- 4. A standard for message logging in a network.
- 7. A security process requiring two different forms of identification.
- 8. Replacing sensitive data with unique identification symbols.
- 13. A targeted phishing attack aimed at a specific individual or organization.
- 14. A physical or digital device used to authenticate identity.
