Across
- 3. A professional who tests computer systems for vulnerabilities. (7, 6)
- 9. The security technique that modifies sensitive details by replacing it with fictitious information. (4, 7)
- 11. Your unique code used to gain access to websites, apps, and more. (8)
- 12. Framework that enables a third party to integrate with Salesforce, potential for them to be compromised. (9, 4)
- 13. An incident where information is accessed, stolen, or exposed without authorization. (6)
Down
- 1. An add-on product to gain extra security for your Salesforce org. (6)
- 2. The security technique that encourages an implicit lack of faith in all users. (4, 5)
- 4. Digitally altered appearances, one of the ways AI could cause security issues. (9)
- 5. Initialism, require a user to provide two or more verification factors to gain access. (3)
- 6. Salesforce encourages the principle of least ___. (10)
- 7. Salesforce recently announced a partnership with this company to enhance Agentforce security. (11)
- 8. Fraudulent communications that appear to come from a legitimate source. (8)
- 10. The EU data privacy and security law. (4)
- 13. This solution is useful in all cases of data loss. (6)
