Across
- 1. : Strengthening security configurations of systems
- 6. : Approved list of trusted entities or applications
- 7. : Formal examination of security policies and systems
- 8. : Decoy network set up to detect unauthorized access
- 10. : Using multiple backup systems to prevent failure
Down
- 2. : Separating systems to prevent security breaches
- 3. : Simulating software or hardware to test security
- 4. : Making data intentionally difficult to interpret
- 5. : Gaining higher privileges within a system
- 9. : Ensuring data remains accurate and unaltered
