Information Security

12345678910111213
Across
  1. 5. intent of doing harm
  2. 7. requirement of being private or secret
  3. 8. procedure to determine user privileges or access to programs
  4. 12. info or data which can be accessed when needed
  5. 13. gap or weakness which undermines an organization's security
Down
  1. 1. network of computers and devices managed as a unit with procedures and rules
  2. 2. how information is protected
  3. 3. short for "malicious software" and covers threats such as viruses, worms, Trojan horse, ransom ware,and the numerous other programs used by hackers to gain or access or damage computer programs
  4. 4. macros which have been coded with malicious intent
  5. 6. calculated assessment of potential threats to an organizations security
  6. 9. making sure a person is who they say they are
  7. 10. state of being complete or uncorrupted
  8. 11. rights an individual or organization has over info and how it is used