Cyber Security Unit-1 Puzzle

123456789101112131415
Across
  1. 3. An object representing a user's security context in Windows.
  2. 4. Act that uses vulnerability to do damage to systems.
  3. 7. A security barrier that controls network traffic.
  4. 11. Ensuring data has not been altered or tampered with.
  5. 13. Information safe from accidental or intentional disclosure.
  6. 14. Information is available to authorized users when needed.
  7. 15. The process of converting data into a secret code.
Down
  1. 1. Gaps in a security program.
  2. 2. The act of guaranteeing information is protected.
  3. 5. The art and science of secret communication.
  4. 6. An electronic document used to prove identity online.
  5. 8. The process of verifying who you are.
  6. 9. A type of encryption using only one shared key.
  7. 10. The process of a computer running a program's instructions.
  8. 12. Exploit a vulnerability intentionally or accidentally.