Across
- 3. assets of the computer system should be accessible only by authorized parties
- 4. A set of circumstances that has the potential to cause loss or harm
- 5. A weakness in the system
Down
- 1. assets can be modified only by authorized parties or in authorized ways
- 2. authorized parties should not be prevented from accessing objects to which they have legitimate access
- 3. An action, device, procedure, or technique that eliminates/reduces a vulnerability and/or to counter threats