Across
- 2. A specific flaw or weakness in a system.
- 4. A setup error (like leaving default settings on).
- 5. When a vulnerability has been successfully used by an attacker.
- 8. The state of being open to harm or danger.
- 9. The total area where an attacker can try to enter (2 words).
Down
- 1. Following laws and regulations (like GDPR).
- 3. The proving of "Who you are" (User ID + Password).
- 6. Internal rules or guidelines a company follows.
- 7. The "keys" used to access a system (Username/Password).
