Information Security

1234567891011121314151617181920212223242526272829
Across
  1. 2. Сombining several means of presenting information in one system.
  2. 4. Preventing unauthorized access; safety.
  3. 5. List of objects that are under suspicion regarding security.
  4. 7. Bait net; trap network.
  5. 8. Technical devices.
  6. 10. Data interception.
  7. 16. Unauthorized entry into the system bypassing its protection.
  8. 18. Security of information.
  9. 20. Computer program.
  10. 23. The user's secret password to unlock the phone/smartphone.
  11. 25. The process of rewriting or deletion information.
  12. 26. Identification of intruders or threats.
  13. 27. Type of malware.
  14. 28. Avoiding bad events.
  15. 29. Disclosure of information.
Down
  1. 1. Proof.
  2. 3. Encoding of information.
  3. 6. A set of tools that allows the user to interact with the program.
  4. 9. Computer attacker.
  5. 11. Security of information.
  6. 12. The weakest link in computer security.
  7. 13. A crime involving a computer or computer network.
  8. 14. The amount of potential damage.
  9. 15. Bad event.
  10. 17. Masking an intruder or malware.
  11. 19. Secret character set.
  12. 21. System user.
  13. 22. User, trying to gain unauthorized access to a computer system.
  14. 24. Effort to penetration into the system.
  15. 25. Organized collection of structured information.