Across
- 2. The process of encoding information to protect its confidentiality and integrity
- 4. Removal of existing security threats
- 6. Physical components used to secure information and devices
- 9. Information assets and data needing protection
- 11. Measures to avoid potential security threats
- 12. Protection of intellectual property rights
- 14. Identification of threats as they arise
- 18. Engineering-based security solutions for information protection
- 19. The principle focused on protecting personal, organizational, or state-related secrets
- 20. A digital tool used to verify the authenticity of a document's sender
Down
- 1. Programs designed to secure information within computer systems
- 3. The continuous practice of monitoring, updating, and enhancing security protocols
- 4. The process of assessing vulnerabilities and threats to information systems
- 5. A mechanism to confirm a user's identity in a computer system
- 7. The trustworthiness and dependability of security measures
- 8. Type of security protection involving physical barriers and equipment
- 10. Returning systems to their state prior to a security breach
- 13. Type of security measure involving compliance with laws
- 15. Potential event or action that could compromise information security
- 16. Assessment and processing of information to predict and prevent criminal actions
- 17. Allowing authorized users to retrieve necessary information
