Across
- 1. CONTROL Restricting system access based on privileges
- 7. Process of verifying user identity
- 8. RESPONSE Structured approach for handling security events
- 11. Authentication without traditional credentials
- 13. Secure tunnel for online privacy
- 14. Copy of data for recovery purposes
- 15. Physical or digital item used to verify identity
Down
- 2. HYGIENE Daily security habits to maintain a safe system
- 3. ENGINEERING Manipulation of people to gain confidential info
- 4. TRUST Security model assuming no user or system is inherently trusted
- 5. Security method using more than one verification factor
- 6. Regularly updating software to fix vulnerabilities
- 9. BREACH Unauthorized disclosure of confidential information
- 10. KEY Secret used to decrypt encrypted information
- 12. AWARENESS Training users on digital safety
