Cybersecurity

12345678910
Across
  1. 4. provides the validation of a message's origin.
  2. 6. Ensures that data is not modified or tampered with.
  3. 7. The degree of protection against danger, damage, loss, and criminal activity.
  4. 8. Ensures that a system is up so that data is available when needed.
  5. 10. Anything that has the potential to cause the loss of an asset.
Down
  1. 1. An act, procedure, or piece of software that takes advantage of a vulnerability to carry out an attack.
  2. 2. Ensures that data is not disclosed to unintended persons.
  3. 3. An opening or weakness in the system.
  4. 5. agent The person or entity that attempt or carries out a threat.
  5. 9. Something that has value to an individual or an organization.