Across
- 2. Weakness in a system
- 4. Protects sensitive information
- 5. Security-related event
- 6. Permission to use resources
- 9. Ensures systems are accessible
- 10. Testing for security weaknesses
- 11. Ensures data is accurate and unaltered
- 14. Restriction of access
- 15. Potential cause of harm
Down
- 1. Notification of suspicious activity
- 3. Action taken after an incident
- 7. Adherence to regulations
- 8. Observing system activity
- 12. Restoring after a breach
- 13. Takes advantage of a vulnerability
