Across
- 3. A circumstance or event that interrupts or prevents the correct operation of system services and functions
- 7. Restoring systems and data to normal operation after a failure or security breach
- 9. A cipher in which each letter is shifted by a fixed number
- 10. Any step or action taken to defend against security attacks
- 12. Users can’t deny their actions
- 13. Special software embedded into hardware device
- 14. Keep information correct
Down
- 1. Type of attack in which attempts are made to observe or learn information without affecting system resources
- 2. The person or entity performing the attack
- 4. Tracks actions
- 5. An employee accidentally sends customer data to the wrong email address
- 6. A U.S. government standard (by NIST) for categorizing information systems based on the CIA goals
- 8. Weakness in a system resource
- 11. Foundation of security
