Information Security

123456789
Across
  1. 2. Copies from one computer to the next to deplete memory and overwhelm network traffic
  2. 5. A program to convert data prior to and after transmission
  3. 7. Use of a software to eavesdrop on information sent and received by user
  4. 8. Formal standards that have been assessed and approved
  5. 9. Information Security goal to ensure data accuracy
Down
  1. 1. The unauthorized intrusion of the computer network for tempering
  2. 3. To delete data and application without physical access
  3. 4. The objective is to separate internal and external network and prevent passage of specific types of traffic
  4. 5. To ensure that a policy is being followed
  5. 6. Type of encryption that requires two keys