Defensive Concepts & Best Practices

123456789101112131415
Across
  1. 1. CONTROL Restricting system access based on privileges
  2. 7. Process of verifying user identity
  3. 8. RESPONSE Structured approach for handling security events
  4. 11. Authentication without traditional credentials
  5. 13. Secure tunnel for online privacy
  6. 14. Copy of data for recovery purposes
  7. 15. Physical or digital item used to verify identity
Down
  1. 2. HYGIENE Daily security habits to maintain a safe system
  2. 3. ENGINEERING Manipulation of people to gain confidential info
  3. 4. TRUST Security model assuming no user or system is inherently trusted
  4. 5. Security method using more than one verification factor
  5. 6. Regularly updating software to fix vulnerabilities
  6. 9. BREACH Unauthorized disclosure of confidential information
  7. 10. KEY Secret used to decrypt encrypted information
  8. 12. AWARENESS Training users on digital safety