Across
- 4. The protection of information and systems from cyberattacks
- 5. A threat originating from within an organization
- 7. The overall protection of computer systems and data
- 8. A weakness in a computer system that can be exploited
- 9. The transfer of information between devices
Down
- 1. The act of stealing or manipulating data
- 2. Unintentional harm caused to data or systems
- 3. A threat originating from the internet
- 6. The practice of illegally gaining access to a computer system