Across
- 1. Place to store high privilege passwords
- 5. seamless integration of security testing and protection throughout the software development and deployment lifecycle
- 7. Unplanned downtime of IT resources
- 9. process sets out the stages of a possible cyberattack and allows organizations to identify and protect themselves against threats
Down
- 2. Need to impart to everyone to protect the organization
- 3. IT Governance framework from ISACA
- 4. is a general purpose cryptography library that provides an open source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security
- 6. is a quick-repair job for a piece of programming designed to resolve functionality issues, improve security or add new features.
- 7. is a nonprofit foundation dedicated to improving software security
- 8. Information security triad
