information security
Across
- 3. networks of computers and devices managed as a unit with the same procedures and rules.
- 5. intent of doing harm
- 6. rights an individual or organization has over information and how it is used.
- 8. gap or weakness which undermines an organization’s security efforts.
- 9. calculated assessment of potential threats to an organization’s security.
- 10. State of being complete or uncorrupted
- 12. Short for malicious software and covers threats such as viruses, worms, trojans, Horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive info on a computer.
- 13. how information is protected
Down
- 1. making sure a person is who they say they are.
- 2. Information or date which can be accessed when needed.
- 4. procedure used to determine users privilege or access levels to the system.
- 7. requirement of being private or secret
- 11. virus macros which have been programmed to carry out malicious intent