Across
- 3. An object representing a user's security context in Windows.
- 4. Act that uses vulnerability to do damage to systems.
- 7. A security barrier that controls network traffic.
- 11. Ensuring data has not been altered or tampered with.
- 13. Information safe from accidental or intentional disclosure.
- 14. Information is available to authorized users when needed.
- 15. The process of converting data into a secret code.
Down
- 1. Gaps in a security program.
- 2. The act of guaranteeing information is protected.
- 5. The art and science of secret communication.
- 6. An electronic document used to prove identity online.
- 8. The process of verifying who you are.
- 9. A type of encryption using only one shared key.
- 10. The process of a computer running a program's instructions.
- 12. Exploit a vulnerability intentionally or accidentally.
