Across
- 3. authorization to perform some action on a system
- 6. automated recognition of individuals based on their biological and behavioral characteristics
- 8. guarding against improper information modification or destruction
- 9. A string of characters to verify access authorization
Down
- 1. assurance that information is not disclosed to unauthorized individuals or processes
- 2. confidentiality mode that transforms usable data into an unreadable form
- 3. scam to deceive people into revealing sensitive information
- 4. collection of values assigned to base measures, derived measures, and/or indicators
- 5. probability that a particular security threat will exploit a system vulnerability
- 7. software specifically designed to disrupt, damage, or gain unauthorized access to a computer system