Information Security

123456789101112131415
Across
  1. 4. making sure a person is who they say they are
  2. 5. short for "malicious software" and covers threats such as viruses, worms, Trojan
  3. 6. macros which have been programmed to carry out malicious intent
  4. 8. requirement of being private or secret
  5. 10. calculated assessment of potential threats to an organization’s security
  6. 11. how information is protected
  7. 14. ransomware and the numerous other programs used by hackers to gain
  8. 15. information or data which can be accessed when needed
Down
  1. 1. network of computers and devices managed as a unit with the same procedures and rules
  2. 2. gap or weakness which undermines an organization’s security efforts
  3. 3. rights an individual or organization has over information and how it is used
  4. 7. to or damage sensitive information on a computer
  5. 9. intent of doing harm
  6. 12. state of being complete or uncorrupted
  7. 13. procedure used to determine user privileges or access levels to the system