Across
- 3. This component manages hardware and software resources on a computer(13 letters)
- 5. A set of processes and technologies used to protect data in information systems(13 letters)
- 7. A type of security that focuses on protecting communication via emails (5,8 letters)
- 8. A structured collection of data or information that can be easily accessed, managed, and updated(8 letters)
- 10. The high-level description of how an OS interacts with hardware and software (9,7 letters)
- 11. These are categorized into tangible and intangible types, and have organizational value (5,5 letters)
- 12. Refers to the weaknesses in an operating system that can be exploited (14 letters)
- 14. A rule that enforces how passwords should be created and managed (8,8 letters)
- 15. A method of security that often involves layers like hardware, software, and processes (8,7 letters)
Down
- 1. The full form of DBMS (8,10 letters)
- 2. An individual element in an information system that has value and requires protection(5 letters)
- 4. A program that manages user permissions and roles in a system (4,13 letters)
- 6. Refers to the protection of devices and users connected through the web (7,8 letters)
- 9. The process of verifying the identity of a user(14 letters)
- 13. The overall design and structure of security controls in an organization(11 letters)
