Cybersecurity fun
Across
- 4. legal constraints that govern how data can be used or stored. Permission is often required from individual as to these elements
- 6. possibility of undesired outcome occurring
- 7. information classification
- 8. Electronic or digital method to control how devices operate or control how they can or can not be used
- 11. any security incident where sensitive, protected, or confidential data is accessed or stolen by an unauthorized party
- 14. the original form of a message
- 15. protect before an event happens
Down
- 1. all the information on a website
- 2. a conventional type of encryption
- 3. the process of adding our signature to the document to show integrity
- 5. someone who is responsible for developing algorithms and ciphers to encrypt sensitive data and may work together with a security software developer in developing security systems
- 9. a process of encoding a message so that its meaning is not obvious
- 10. the a in CIA triad
- 12. ways to protect vulnerabilities
- 13. copies of data