Across
- 3. short for "malicious software" and covers threats such as viruses, worms, Trojanhorses, ransomware and the numerous other programs used by hackers to gainaccess to or damage sensitive information on a computer
- 5. intent of doing harm
- 8. gap or weakness which undermines an organization’s security efforts
- 10. making sure a person is who they say they are
- 11. rights an individual or organization has over information and how it is used
- 13. procedure used to determine user privileges or access levels to the system
Down
- 1. Virus macros which have been programmed to carry out malicious intent
- 2. how information is protected
- 4. information or data which can be accessed when needed
- 6. state of being complete or uncorrupted
- 7. calculated assessment of potential threats to an organization’s security
- 9. network of computers and devices managed as a unit with the same proceduresand rules
- 12. requirement of being private or secret
