Information Security Crossword

123456789
Across
  1. 4. A set of principles, rules, and guidelines adopted by an organization to reach its long-term goals and is accessible to everyone in the company.
  2. 5. A type of malware that is often disguised as legitimate software.
  3. 6. A probability of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal weakness.
  4. 8. The need to ensure that information is disclosed only to those who are authorized to view it.
  5. 9. A network security system, either hardware- or software-based, that uses rules to control incoming and outgoing network traffic.
Down
  1. 1. A possible danger that might exploit a flaw or weakness to breach security and therefore cause possible harm.
  2. 2. A flaw or weakness that can be used to attack a system or organization.
  3. 3. A secret series of characters used to authenticate a person’s identity.
  4. 4. An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information.
  5. 7. A person who uses computers to gain unauthorized access to computer systems and networks.