information security

1234567891011121314151617
Across
  1. 5. or data which can be accessed when needed
  2. 6. sure a person is who they say they are
  3. 7. used to determine user privileges or access levels to the system
  4. 9. to or damage sensitive information on a computer
  5. 12. ransomware and the numerous other programs used by hackers to gain
  6. 14. information is protected
  7. 15. or weakness which undermines an organization’s security efforts
  8. 16. an individual or organization has over information and how it is used
  9. 17. of being private or secret
Down
  1. 1. of being complete or uncorrupted
  2. 2. rules
  3. 3. of doing harm
  4. 4. which have been programmed to carry out malicious intent
  5. 8. assessment of potential threats to an organization’s security
  6. 10. for "malicious software" and covers threats such as viruses, worms, Trojan
  7. 11. of computers and devices managed as a unit with the same procedures
  8. 13. Virus