Study

123456789101112131415
Across
  1. 2. Weakness in a system
  2. 4. Protects sensitive information
  3. 5. Security-related event
  4. 6. Permission to use resources
  5. 9. Ensures systems are accessible
  6. 10. Testing for security weaknesses
  7. 11. Ensures data is accurate and unaltered
  8. 14. Restriction of access
  9. 15. Potential cause of harm
Down
  1. 1. Notification of suspicious activity
  2. 3. Action taken after an incident
  3. 7. Adherence to regulations
  4. 8. Observing system activity
  5. 12. Restoring after a breach
  6. 13. Takes advantage of a vulnerability