Across
- 2. The process of converting data into a code to prevent unauthorized access.
- 6. Rights Management (DRM) Technologies that control the use of digital content, preventing unauthorized distribution.
- 8. on Security Investment (ROSI) A calculation that compares the value gained from security measures with the cost.
- 9. A copy of data stored separately to prevent loss in case of a system failure.
- 12. Rights granted to users to perform specific actions, such as reading or editing files.
- 13. A system that monitors and controls incoming and outgoing network traffic to protect against threats.
- 16. Actions taken to reduce risk or lessen the impact of potential threats.
Down
- 1. A legal right that gives the creator of an original work exclusive rights to its use and distribution.
- 3. A symbol, word, or phrase legally registered to represent a company or product.
- 4. Account Control (UAC) A security feature in Windows that requires administrative approval before making changes.
- 5. Breach The unauthorized access and retrieval of sensitive information.
- 7. Visualization The graphical representation of data to make it easier to understand.
- 8. Assessment The process of identifying and evaluating risks to minimize potential harm.
- 10. An exclusive right granted for an invention, providing protection for a limited period.
- 11. The process of setting up software on a device.
- 14. Availability Ensures systems remain operational without downtime.
- 15. Tolerance Technology that ensures a system remains operational even if part of it fails.
