Information Security Crossword

123456789
Across
  1. 2. A flaw or weakness that can be used to attack a system or organization
  2. 5. A secret series of characters used to authenticate a person’s identity.
  3. 6. An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information.
  4. 7. A person who uses computers to gain unauthorized access to computer systems and networks.
  5. 8. Personal information related to personal data stored on computer systems
  6. 9. A situation or someone that can cause damage to the confidentiality, integrity, or availability of your data.
Down
  1. 1. A type of malware that is often disguised as legitimate software.
  2. 3. A set of principles, rules, and guidelines adopted by an organization to reach its long-term goals and is accessible to everyone in the company
  3. 4. Anything that has the potential to cause serious harm to a computer system.