XYZ

123456789
Across
  1. 2. A specific flaw or weakness in a system.
  2. 4. A setup error (like leaving default settings on).
  3. 5. When a vulnerability has been successfully used by an attacker.
  4. 8. The state of being open to harm or danger.
  5. 9. The total area where an attacker can try to enter (2 words).
Down
  1. 1. Following laws and regulations (like GDPR).
  2. 3. The proving of "Who you are" (User ID + Password).
  3. 6. Internal rules or guidelines a company follows.
  4. 7. The "keys" used to access a system (Username/Password).