Across
- 2. ______ are damaging to the reputation of companies and expose their customers to identity theft
- 4. ______ determines an authenticated person’s or service’s level of access. It defines which data they can access, and what they can do with it
- 7. ______ refers to the accuracy and consistency of data and information. Ensuring data integrity means preventing unauthorized alterations or tampering of data
- 8. ______ is a type of social engineering where an attacker sends a fraudulent message designed to convince you to provide sensitive information via a message or a fraudulent web site, gain access to your device by convincing you to click on a link or open an attachment that contains malware, and convince you to provide something of value to the attacker
- 9. ______ refers to the principle of ensuring that authorized users have access to the information they need when they need it. This can be achieved through measures such as redundant systems, backups, and disaster
Down
- 1. ______ is a type of software designed to damage or disrupt computer systems
- 3. The principle of ______ involves protecting sensitive information from unauthorized access. This can be achieved through methods such as encryption or access controls
- 5. ______ is a process verifying the identity of a person or service. It requests legitimate access credentials and basis for creating secure identity and access control principles
- 6. ______ is vicious malware that locks users out of their devices until they pay a ransom
