Across
- 2. malware that encrypts data allowing attackers to hold it hostage for payment
- 4. anyone trying to access data they do not have authorization for
- 6. guarantees that systems and information are accessible to authorized users when needed, even under challenging conditions
- 8. ensures sensitive and protected data is disclosed only to authorized users
- 10. (Two words)provided by Defender, quantified comparison of your security to industry standards
Down
- 1. (Two words)Security model where no one is automatically trusted
- 3. (Two words)outlook and strength of security
- 5. tricking people into revealing sensitive information
- 7. Acronym for multilayered security practice
- 9. ensures that data is trustworthy, accurate, and has not been altered by unauthorized users or processes
