Across
- 6. fraudulent practice of sending emails or other messages in order to induce individuals to reveal personal or sensitive information
- 8. authentication method which requires two or more verification factors
- 9. accuracy, completeness and consistency of data
- 11. a person or thing likely to cause damage or danger
- 13. making sure that no sensitive information on a monitor when left unattended
Down
- 1. a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it
- 2. attempt to exploit a computer system or a private network inside a computer
- 3. the process of modifying sensitive date in such a way that it is no or little value to unauthorized intruders
- 4. a senior-level executive responsible for developing and implementing an information security program
- 5. regulations, rules and practices that prescribe how to manage, protect and distribute information
- 7. type of malicious software designed to block access
- 10. attempt to destroy, alter, disable or gain access to an asset
- 12. a copy of data made in case the original is lost or damaged
