provalas

1234567891011121314151617181920
Across
  1. 7. makes sure users are who they say
  2. 9. used to hack
  3. 11. who does security build trust with
  4. 12. sensitive data that is not tampered with
  5. 15. business managers who categorize decides authorization
  6. 16. management instructions on how things should run
  7. 17. facts, recorded observation, statistics
  8. 18. hackers go after what
  9. 20. if your password has 8 characters/ alphabetic + numeric
Down
  1. 1. installation malware, entry into internal systems
  2. 2. users given access to sensitive info
  3. 3. note taking app
  4. 4. browser based
  5. 5. proof that a transfer was successful
  6. 6. only users who need access to info have access
  7. 8. cloud storage
  8. 10. physical access
  9. 13. voice over internet protocol
  10. 14. authorized access to info
  11. 19. where does security start