Across
- 3. A technique of verifying identities before granting access to information.
- 4. The practice of keeping sensitive information in private and secure places.
- 6. Preventing attackers from gathering personal or sensitive information about you.
- 7. Management The action of identifying and managing risks in an organization’s security plan.
- 8. A social engineering technique where attackers attempt to manipulate victims using fake identities.
- 9. Keeping track of who accesses sensitive information and when.
Down
- 1. A method used to ensure that only authorized users can access sensitive data.
- 2. The process of verifying a person’s identity through various means, like passwords, biometrics, or tokens.
- 5. The act of notifying employees about security risks and best practices.
