iSEC Dimensions, CrossWord

12345678910
Across
  1. 2. A measure that ensures data has not been tampered with.
  2. 5. sotware that lets a user to obtain info about another's system activities.
  3. 7. A vulnerability in software that is not yet known to the vendor.
  4. 9. Process for labeling data by security or compliance requirements
  5. 10. The process of ensuring that only authorized individuals can access specific data or systems.
Down
  1. 1. program or a hardware device that filters all data packets coming through the internet.
  2. 3. Right to be forgotten is applied under.
  3. 4. A method of ensuring the data has not been altered.
  4. 6. Data in a structured, commonly used and machine-readable format.
  5. 8. The illegal copying and distribution of software.