Information Security

12345678910
Across
  1. 2. Detailed minimum specifications for compliance
  2. 4. Unauthorized entry into the real or virtual property of another party
  3. 7. Common theft of credit card numbers (Information extortion)
  4. 9. This threat actually evolves to elude detection
  5. 10. Being secure and free from danger
Down
  1. 1. The legal obligation to compensate an injured party for wrongs doings.
  2. 3. Raw facts collected by an organization
  3. 5. Step-by-step instructions for compliance
  4. 6. regulate and define socially acceptable behavior.
  5. 8. An adverse event begins to manifest as a threat to data, it becomes an