CyberSecurity 1

123456789
Across
  1. 3. Entitlement is very closely related to ... performed
  2. 4. ... to standard is verified during audit
  3. 7. IAM also differentiates 'authenticate' and ...
  4. 8. We differentiate between User and ... in IAM
  5. 9. ISO 27000 standards has 14 categories for ...
Down
  1. 1. S in SOD
  2. 2. Issue faced by user in IT
  3. 5. A in CIA
  4. 6. C in PDCA
  5. 8. Example of non-human identity