cybersecurity

1234567891011121314151617
Across
  1. 2. The information property of being accessible only to a restricted group of persons
  2. 5. Cryptographic algorithm used to encrypt and decrypt data
  3. 6. Technique used to secure sensitive data by encoding it in such a way that only authorized parties can access the information
  4. 7. The potential for harm or loss resulting from threats exploiting vulnerabilities in an organization's information systems, networks, or data assets
  5. 9. Any potential danger or risk that can exploit vulnerabilities in an organization's systems, networks, or data
  6. 12. The way of covering communication based on keeping the very fact of communication secret
  7. 13. The act of granting rights matching with the identifier
  8. 15. The process of discovering the true identity of a person or item from the entire collection of similar persons or items
  9. 16. The existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the computer system, network, application, or protocol involved
  10. 17. Type of threat sources when the actor is a human-being
Down
  1. 1. The best subject :)
  2. 3. The information property of being accessible and usable by a legal user with possible conditions set by information owner
  3. 4. Type of access control where determined rights can be represented as an authorization matrix
  4. 8. Type of threat sources occured because of the devices misfunction
  5. 10. Data that is stored, processed, transmitted, or accessed within an organization's systems, networks, or applications
  6. 11. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
  7. 14. The information property of having no illegal or unauthorized modifications