Across
- 5. or data which can be accessed when needed
- 6. sure a person is who they say they are
- 7. used to determine user privileges or access levels to the system
- 9. to or damage sensitive information on a computer
- 12. ransomware and the numerous other programs used by hackers to gain
- 14. information is protected
- 15. or weakness which undermines an organization’s security efforts
- 16. an individual or organization has over information and how it is used
- 17. of being private or secret
Down
- 1. of being complete or uncorrupted
- 2. rules
- 3. of doing harm
- 4. which have been programmed to carry out malicious intent
- 8. assessment of potential threats to an organization’s security
- 10. for "malicious software" and covers threats such as viruses, worms, Trojan
- 11. of computers and devices managed as a unit with the same procedures
- 13. Virus
