Cyber Puzzle

12345678910111213
Across
  1. 6. fraudulent practice of sending emails or other messages in order to induce individuals to reveal personal or sensitive information
  2. 8. authentication method which requires two or more verification factors
  3. 9. accuracy, completeness and consistency of data
  4. 11. a person or thing likely to cause damage or danger
  5. 13. making sure that no sensitive information on a monitor when left unattended
Down
  1. 1. a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it
  2. 2. attempt to exploit a computer system or a private network inside a computer
  3. 3. the process of modifying sensitive date in such a way that it is no or little value to unauthorized intruders
  4. 4. a senior-level executive responsible for developing and implementing an information security program
  5. 5. regulations, rules and practices that prescribe how to manage, protect and distribute information
  6. 7. type of malicious software designed to block access
  7. 10. attempt to destroy, alter, disable or gain access to an asset
  8. 12. a copy of data made in case the original is lost or damaged