Chapter 6 Security

12345678910
Across
  1. 2. malware that encrypts data allowing attackers to hold it hostage for payment
  2. 4. anyone trying to access data they do not have authorization for
  3. 6. guarantees that systems and information are accessible to authorized users when needed, even under challenging conditions
  4. 8. ensures sensitive and protected data is disclosed only to authorized users
  5. 10. (Two words)provided by Defender, quantified comparison of your security to industry standards
Down
  1. 1. (Two words)Security model where no one is automatically trusted
  2. 3. (Two words)outlook and strength of security
  3. 5. tricking people into revealing sensitive information
  4. 7. Acronym for multilayered security practice
  5. 9. ensures that data is trustworthy, accurate, and has not been altered by unauthorized users or processes