Across
- 2. Continuously observing systems for suspicious activity.
- 4. Strengthening systems by reducing vulnerabilities.
- 5. Converting data into a coded format to protect it.
- 7. Protecting personal or sensitive information by design.
- 8. Verifying the identity of users before granting access.
- 9. Recording system events for auditing and analysis.
- 10. Dividing networks or systems to limit security risks.
Down
- 1. Granting permissions based on user roles or rights.
- 3. Checking input data to prevent errors or attacks.
- 6. Designing systems to continue operating under attacks.
