Information security

123456789
Across
  1. 4. potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability.
  2. 5. Is the process of determining and assigning privileges to various resources, objects or data.
  3. 6. the action of stopping any form of attack from happening.
  4. 8. An internet scam that targets unsuspecting users through email.
  5. 9. Is a technique that is used to exploit a vulnerability in any application attack gaps in a security program that can be exploited by threats to gain unauthorized access to an asset.
Down
  1. 1. a way of injecting malicious scripts into web pages.
  2. 2. Are small files that Web sites put on your computer hard disk drive when you first visit.
  3. 3. the process of tracking recording system activities and resource access.
  4. 7. People, property, and information that needed to be protected asset Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset.