Joshua Crossword Puzzle
Across
- 3. - A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
- 4. - is the process of detecting and preventing illegal or unauthorized use of a computer
- 5. - is ensuring that the information is accessible to authorized persons when required without delay.
- 7. - includes the applications on the computers and operating system.
- 9. theft - Any action of stealing information from a users system.
- 10. - An individual who breaks into computer systems to steal, change, or destroy information.
- 11. - An action or event that has the potential to compromise and/or violate security.
Down
- 1. - A defined method of breaching the security of an IT system through vulnerability.
- 2. - refers to protecting personnel, hardware, programs, networks, and data from physical threats.
- 6. Any action derived from intelligent threats to violate the security of the system.
- 8. preventing intruders from accessing any part of a computer system.