Across
- 2. - weakness of an asset or control that can be exploited by one or more threats
- 4. - property that information is not made available or disclosed to unauthorized individuals, entities, or processes
- 5. part that is logically and technically separable
- 7. - object that has value, or contributes to value
- 9. - the process of encoding information to protect information from unauthorized access
- 11. - property of being accessible and usable on demand by an authorized entity
- 13. - provision of assurance that a claimed characteristic of an entity is correct
- 14. - property of accuracy and completeness
Down
- 1. - a segment of code or a program designed to take advantage of a flaw in a computer system
- 3. - security process that determines a user or service's level of access
- 6. - the assurance that someone cannot deny the validity of something
- 8. - occurrence or change of a particular set of circumstances
- 10. - estimate of magnitude of damage or physical harm from a damage scenario
- 12. - person, group, or organization that carries out an attack path