Fundamentals of CYbersecurity
Across
- 4. secrecy of the information
- 5. Involves a computer or computer network
- 7. Warning for malicious activity
- 8. control Role management and rule management
- 11. Weakness in information system
Down
- 1. assurance that the information received is exact and accurate
- 2. enables you to manage and secure your mobile workforce with app security, container app security and secure mobile mail.
- 3. Security measures for protecting a computer network from intruders, including both wired and wireless (Wi-Fi) connections.
- 6. Attempt to gain unauthorized access
- 9. Virtual component world
- 10. security triads
- 12. identify the user or system or the entity