IT SECURITY

1234567891011
Across
  1. 5. Assurance that the confidentiality of, and access to, certain information about an entity is protected.
  2. 6. a verbal, written, or recorded communication sent to or left for a recipient who cannot be contacted directly.
  3. 8. an open source and freely available software package for email security
  4. 9. a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
  5. 10. software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
  6. 11. the process of converting information or data into a code, especially to prevent unauthorized access.
Down
  1. 1. network security device that monitors and filters incoming and outgoing network traffic
  2. 2. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information
  3. 3. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
  4. 4. The conversion of encrypted data into its original form
  5. 7. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.