Across
- 1. A flaw or weakness in a computer system that could be exploited to violate the security of a system
- 3. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files until money is paid
- 5. Written compliance requirement with regards your obligation as an employee
- 6. Assurance that information is only exposed to those who are authorised to access it
- 8. Assignation of identifying mark to guide handling and storage
- 10. A fraudulent email supposedly from a reputable company attempting to get personal information
- 12. Verifying identity
Down
- 2. Information is present in the required form at the time it is required
- 4. Method for making information unreadable unless authorised
- 7. If you see something, say something! Report all security ___________________.
- 9. The "I" in the CIA triad. It Ensures that information maintains its accuracy
- 11. Secure passwords are great but ___________________ are even better
