Puzzle on Security

123456789101112131415
Across
  1. 2. When an information is protected from disclosure or exposure to unauthorized individuals or systems
  2. 6. When an information is whole, complete, and uncorrupted
  3. 9. Defines information security as the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information
  4. 10. Software programs that hide their true nature and reveal their designed behavior only when activated
  5. 12. These software components or programs are designed to damage, destroy, or deny service to the target
  6. 13. the act of sending an e-mail message with a modified field
  7. 14. The first wide-area packet-switching network with distributed control and the first network to implement the TCP/IP protocol suite
  8. 15. When an information is free from mistakes or errors and it has the value that the end user expect
Down
  1. 1. A weaknesses or fault in a system or protection mechanism that opens it to attack or damage
  2. 3. Computer Security centered on a system
  3. 4. A computer consists of segments of code that perform malicious actions
  4. 5. A well-known and broad category of electronic and human activities that can breach the confidentiality of information
  5. 7. A malicious program that replicates itself constantly, without requiring another program environment
  6. 8. This German code machine _______ were first broken by the Poles in the year 1930
  7. 10. A category of objects, persons, or other entities that presents a danger to an asset
  8. 11. The probability that something unwanted will happen
  9. 14. An intentional or unintentional act that can cause damage to information and/or the systems that support it