Across
- 2. Using hardware and software tools to protect information systems.
- 3. Informing users about security threats and encouraging vigilance.
- 5. The state when data is actively being used or manipulated by a system.
- 6. Ensuring information is accurate and has not been altered without authorization.
- 8. Ensuring that systems and data are accessible when needed.
- 9. Ensuring that information is accessible only to authorized individuals.
Down
- 1. The state when data is at rest in any kind of storage medium.
- 2. The state when data is being transferred between locations or systems.
- 4. Documented rules and steps that govern security practices and responses.
- 7. Teaching users the skills to handle security-related tasks and respond to incidents.
