cyber
Across
- 2. The danger that comes from companies or people outside your business
- 5. Doing what a reasonable person would do to protect others
- 6. A copy of data kept in case the original is lost
- 9. How rules, decisions, and controls are managed in a company
- 10. A fake message that tricks people into giving away personal info
- 13. When private information is stolen or exposed
- 14. A written rule or guide that staff must follow
- 15. Giving your risk to another party, like an insurance company
- 17. A way to decide who can or can’t see or use something
- 18. Proving you are who you say you are, like with a password
- 19. A weak point in a system that attackers can use
Down
- 1. The steps taken after a cyberattack happens
- 3. Checking carefully before making a business or security decision
- 4. Following the laws, rules, or standards required by authorities
- 7. Keeping information private and protected
- 8. Someone who causes or tries to cause harm in cyberspace
- 11. Hiding data by changing it into secret code
- 12. An official check to see if rules are being followed
- 16. A tool that blocks unsafe internet traffic from entering a system