information security

1234567891011121314
Across
  1. 1. network of computers and devices managed as a unit with the same procedures
  2. 5. Virus macros which have been programmed to carry out malicious intent
  3. 6. to or damage sensitive information on a computer
  4. 8. information or data which can be accessed when needed
  5. 9. procedure used to determine user privileges or access levels to the system
  6. 10. how information is protected
  7. 11. state of being complete or uncorrupted
  8. 13. rights an individual or organization has over information and how it is used
  9. 14. calculated assessment of potential threats to an organization’s security
Down
  1. 2. making sure a person is who they say they are
  2. 3. ransomware and the numerous other programs used by hackers to gain
  3. 4. gap or weakness which undermines an organization’s security efforts
  4. 5. short for "malicious software" and covers threats such as viruses, worms, Trojan
  5. 7. requirement of being private or secret
  6. 9. rules
  7. 12. intent of doing harm