Is it possible to avoid risk?

1234567891011121314
Across
  1. 6. OSI layer that opens and closes conversation between two devices
  2. 8. Refer to an incident where unauthorized individual gain access to a system
  3. 9. Cryptography method that uses a pair of keys
  4. 10. refers to a security measure put in place to mitigate security risk
  5. 12. cloud services that is perfect for Application developers
  6. 14. The Indian bill for personal information protection,
Down
  1. 1. encrypted form of message
  2. 2. type of cybercrime that involves the use of QR codes
  3. 3. provider’s applications running on a cloud
  4. 4. cloud services available for general public
  5. 5. set of rules and standards that define how data is transmitted and received across a network.
  6. 7. / ware made for spying
  7. 11. Non-profit organization that dedicated to improving software security
  8. 13. European laws for privacy