Information Security Crossword
Across
- 4. A set of principles, rules, and guidelines adopted by an organization to reach its long-term goals and is accessible to everyone in the company.
- 5. A type of malware that is often disguised as legitimate software.
- 6. A probability of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal weakness.
- 8. The need to ensure that information is disclosed only to those who are authorized to view it.
- 9. A network security system, either hardware- or software-based, that uses rules to control incoming and outgoing network traffic.
Down
- 1. A possible danger that might exploit a flaw or weakness to breach security and therefore cause possible harm.
- 2. A flaw or weakness that can be used to attack a system or organization.
- 3. A secret series of characters used to authenticate a person’s identity.
- 4. An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information.
- 7. A person who uses computers to gain unauthorized access to computer systems and networks.