Across
- 2. verifying the identity of a user, process, or device
- 3. a flaw or weakness that may allow harm to occur to a system
- 7. malicious code like virus, worm
- 9. Blink's single sign-on(SSO) solution
- 10. an unauthorized user who attempts to or gains access to an information system
Down
- 1. ensuring that data has not been altered or destroyed in an unauthorized manner
- 4. an undocumented way of gaining access to a computer system
- 5. how we work since covid started
- 6. incident that results in disclosure of sensitive data
- 8. individually identifiable health information