Across
- 2. Detailed minimum specifications for compliance
- 4. Unauthorized entry into the real or virtual property of another party
- 7. Common theft of credit card numbers (Information extortion)
- 9. This threat actually evolves to elude detection
- 10. Being secure and free from danger
Down
- 1. The legal obligation to compensate an injured party for wrongs doings.
- 3. Raw facts collected by an organization
- 5. Step-by-step instructions for compliance
- 6. regulate and define socially acceptable behavior.
- 8. An adverse event begins to manifest as a threat to data, it becomes an
