Across
- 2. The information property of being accessible only to a restricted group of persons
- 5. Cryptographic algorithm used to encrypt and decrypt data
- 6. Technique used to secure sensitive data by encoding it in such a way that only authorized parties can access the information
- 7. The potential for harm or loss resulting from threats exploiting vulnerabilities in an organization's information systems, networks, or data assets
- 9. Any potential danger or risk that can exploit vulnerabilities in an organization's systems, networks, or data
- 12. The way of covering communication based on keeping the very fact of communication secret
- 13. The act of granting rights matching with the identifier
- 15. The process of discovering the true identity of a person or item from the entire collection of similar persons or items
- 16. The existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the computer system, network, application, or protocol involved
- 17. Type of threat sources when the actor is a human-being
Down
- 1. The best subject :)
- 3. The information property of being accessible and usable by a legal user with possible conditions set by information owner
- 4. Type of access control where determined rights can be represented as an authorization matrix
- 8. Type of threat sources occured because of the devices misfunction
- 10. Data that is stored, processed, transmitted, or accessed within an organization's systems, networks, or applications
- 11. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
- 14. The information property of having no illegal or unauthorized modifications