Across
- 3. Ability to withstand and recover from cyberattacks
- 5. Potential for harm, loss, or breach
- 7. Deceptive email attacks.
- 8. Adherence to regulations.
Down
- 1. Examination for compliance.
- 2. Trust model with no implicit trust.
- 4. Secure data disposal.
- 6. Security approach to the left.