Across
- 4. potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability.
- 5. Is the process of determining and assigning privileges to various resources, objects or data.
- 6. the action of stopping any form of attack from happening.
- 8. An internet scam that targets unsuspecting users through email.
- 9. Is a technique that is used to exploit a vulnerability in any application attack gaps in a security program that can be exploited by threats to gain unauthorized access to an asset.
Down
- 1. a way of injecting malicious scripts into web pages.
- 2. Are small files that Web sites put on your computer hard disk drive when you first visit.
- 3. the process of tracking recording system activities and resource access.
- 7. People, property, and information that needed to be protected asset Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset.
