Information Security
Across
- 2. The practice of securing communication and data in the presence of adversaries.
- 5. - Providing proof of the origin or delivery of data to protect against denial by one of the parties involved.
- 6. - Ensuring that data remains unchanged from its source and has not been accidentally or maliciously modified, altered, or destroyed.
- 7. - The methodical approach to managing the aftermath of a security breach or cyber attack, also known as an IT incident, computer incident, or security incident.
- 9. - Protecting information from being accessed by unauthorized parties.
Down
- 1. Determining what permissions an authenticated user has within a system.
- 2. - Adhering to laws and regulations relating to protecting and managing data.
- 3. - The process of identifying, assessing, and controlling threats to an organization's digital assets.
- 4. The process of verifying the identity of a user, device, or system.
- 8. - The practice of gathering, analyzing, and reporting on data in a way that is legally admissible.