CCST Cybersec - Week 1

123456789
Across
  1. 2. Using hardware and software tools to protect information systems.
  2. 3. Informing users about security threats and encouraging vigilance.
  3. 5. The state when data is actively being used or manipulated by a system.
  4. 6. Ensuring information is accurate and has not been altered without authorization.
  5. 8. Ensuring that systems and data are accessible when needed.
  6. 9. Ensuring that information is accessible only to authorized individuals.
Down
  1. 1. The state when data is at rest in any kind of storage medium.
  2. 2. The state when data is being transferred between locations or systems.
  3. 4. Documented rules and steps that govern security practices and responses.
  4. 7. Teaching users the skills to handle security-related tasks and respond to incidents.