Information Security Key Terms

12345678
Across
  1. 2. Is about making sure the information, systems and processes are protected from malicious intentional or accidental modification
  2. 4. Principle where authorized users are able to access systems and data when and where possible. On the other hand, unauthorized users should be denied access
  3. 5. The process of translating a given key into a code
  4. 6. A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event
  5. 7. The most common type of social engineering.It exploits human error or gullibility to harvest credentials or spread malware.
  6. 8. A way of scrambling data so that only authorized parties can understand the information
Down
  1. 1. Set of rules that prevent sensitive information being disclosed by unauthorized people.
  2. 3. It describes a wide range of programs or files that could damage a computer or system. They can do multiple things, such as: steal or encrypt data, alter computing functions or even monitor users.