IT SECURITY
Across
- 5. Assurance that the confidentiality of, and access to, certain information about an entity is protected.
- 6. a verbal, written, or recorded communication sent to or left for a recipient who cannot be contacted directly.
- 8. an open source and freely available software package for email security
- 9. a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
- 10. software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
- 11. the process of converting information or data into a code, especially to prevent unauthorized access.
Down
- 1. network security device that monitors and filters incoming and outgoing network traffic
- 2. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information
- 3. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- 4. The conversion of encrypted data into its original form
- 7. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.