Across
- 4. One of the CIA triad pillars that ensures data accuracy.
- 5. A life cycle that integrates security into software development.
- 8. Structured process for building secure systems.
- 9. The person responsible for company-wide information security.
- 10. Protecting data from tampering or deletion ensures this CIA component.
- 11. Set of hardware, software, people, and data.
Down
- 1. The unauthorized act of tricking people to gain confidential data.
- 2. A major type of threat that comes from nature.
- 3. The weakest link in information security.
- 5. An attack that injects malicious code into a database query. (3 letters)
- 6. A principle of InfoSec that ensures only authorized access to data.
- 7. Malicious attempt to disrupt normal system traffic.
