Across
- 2. IT or tech professionals who can fix security issues.
- 3. Action to take when you suspect a security problem – like turning off the water in a leaky house.
- 6. Potential threats or vulnerabilities that could harm digital systems.
- 7. Staying watchful and alert to potential security threats.
Down
- 1. Unauthorized access
- 4. One of the aspects compromised by security risks, involves protecting sensitive information.
- 5. A collective effort to create a safer digital environment by addressing potential risks.