Puzzle on Security
Across
- 2. When an information is protected from disclosure or exposure to unauthorized individuals or systems
- 6. When an information is whole, complete, and uncorrupted
- 9. Defines information security as the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information
- 10. Software programs that hide their true nature and reveal their designed behavior only when activated
- 12. These software components or programs are designed to damage, destroy, or deny service to the target
- 13. the act of sending an e-mail message with a modified field
- 14. The first wide-area packet-switching network with distributed control and the first network to implement the TCP/IP protocol suite
- 15. When an information is free from mistakes or errors and it has the value that the end user expect
Down
- 1. A weaknesses or fault in a system or protection mechanism that opens it to attack or damage
- 3. Computer Security centered on a system
- 4. A computer consists of segments of code that perform malicious actions
- 5. A well-known and broad category of electronic and human activities that can breach the confidentiality of information
- 7. A malicious program that replicates itself constantly, without requiring another program environment
- 8. This German code machine _______ were first broken by the Poles in the year 1930
- 10. A category of objects, persons, or other entities that presents a danger to an asset
- 11. The probability that something unwanted will happen
- 14. An intentional or unintentional act that can cause damage to information and/or the systems that support it