Across
- 1. A process to identify security weaknesses
- 6. A minor breach of security procedures or policies
- 9. A software update to fix vulnerabilities
- 10. A secret word or phrase used for authentication
- 12. an incident that involves the unauthorized access, disclosure, or compromise of sensitive or classified information
- 13. Software designed to detect and remove viruses
Down
- 2. A person or thing likely to cause damage/danger.
- 3. The act of stealing confidential information
- 4. A malicious code that replicates itself
- 5. An unauthorized disclosure of classified information
- 7. A digital attack aiming to steal personal information
- 8. A security feature to detect intrusions
- 10. A set of rules for securing information systems
- 11. An attempt to gain unauthorized access
