cyber

12345678910111213141516171819
Across
  1. 2. The danger that comes from companies or people outside your business
  2. 5. Doing what a reasonable person would do to protect others
  3. 6. A copy of data kept in case the original is lost
  4. 9. How rules, decisions, and controls are managed in a company
  5. 10. A fake message that tricks people into giving away personal info
  6. 13. When private information is stolen or exposed
  7. 14. A written rule or guide that staff must follow
  8. 15. Giving your risk to another party, like an insurance company
  9. 17. A way to decide who can or can’t see or use something
  10. 18. Proving you are who you say you are, like with a password
  11. 19. A weak point in a system that attackers can use
Down
  1. 1. The steps taken after a cyberattack happens
  2. 3. Checking carefully before making a business or security decision
  3. 4. Following the laws, rules, or standards required by authorities
  4. 7. Keeping information private and protected
  5. 8. Someone who causes or tries to cause harm in cyberspace
  6. 11. Hiding data by changing it into secret code
  7. 12. An official check to see if rules are being followed
  8. 16. A tool that blocks unsafe internet traffic from entering a system