Information Security
Across
- 2. when attackers use various methods/tricks to get
- 4. actually purging the data; permanently losing the
- 5. software used to prevent, detect, and remove malware
- 7. testing to see if system vulnerabilities can be exploited in order to actually gain access to systems, the network, data and so forth; acts in a way that an attacker might act
- 9. when someone gains entrance/access by
Down
- 1. on the tailcoats of an authorized person
- 3. information from unsuspecting persons
- 6. used to perform authentication; a username,a certificate,or a token
- 8. Identifying risks to understand the risks that we are exposed to