Across
- 3. The systematic process of finding and fixing security holes in software or networks.
- 4. The act of gaining unauthorized access to computer systems to exploit vulnerabilities.
- 5. A process to determine and document potential threats to an organization
- 7. The analysis and examination of digital data for evidence or investigation.
Down
- 1. The method used to protect information by transforming it into an unreadable format
- 2. The response to and management of a security breach or attack.
- 6. The practice of securing information systems against unauthorized access and threats.
