Across
- 4. This word maintain the accuracy and trustworthinessof data over its entire lifecycle
- 5. Deliberate actions intended to harm, damage, or disrupt a system, person, or organization.
- 7. Measures or systems designed to protect against threats, damage, or unauthorized access.
Down
- 1. This word ensures that information and resources are accessible to authorized users when needed.
- 2. This word ensures that sensitive information is only accessible to authorized individuals.
- 3. The state of being protected from danger, theft, or unauthorized use of resources.
- 6. A term used to describe anything related to computers, networks, or the internet.
