Cybersecurity Concepts

12345
Across
  1. 3. assets of the computer system should be accessible only by authorized parties
  2. 4. A set of circumstances that has the potential to cause loss or harm
  3. 5. A weakness in the system
Down
  1. 1. assets can be modified only by authorized parties or in authorized ways
  2. 2. authorized parties should not be prevented from accessing objects to which they have legitimate access
  3. 3. An action, device, procedure, or technique that eliminates/reduces a vulnerability and/or to counter threats