Module 1 Test
Across
- 4. attack that will publish or withhold data unless money is paid
- 6. this triad is widely accepted security measure
- 7. using phone calls and voicemails to gain personal information
- 8. using deceptive emails to gain personal information
- 10. protection from unauthorized people making changes
Down
- 1. Identity theft, stealing money, stealing private information, controlling private computers
- 2. protection of computer systems, networks, and data from digital attacks
- 3. with "of things" means that so much of our devices are connect to the internet
- 5. assurance that systems and data will be able to be accessed
- 9. protection from people not authorized to view