Across
- 2. malware that is designed to steal personal information, such as passwords , CC numbers
- 4. A process of identifying, assessing, and mitigating security risks
- 5. A set of rules & procedures that govern the security of an organization's information systems.
- 7. A system that prevents unauthorized access to a computer network
- 9. Type of attack that attempts to trick users into revealing confidential information
- 10. The process of verifying the identity of a user or device
Down
- 1. process of granting access to resources based on a user's identity and permissions
- 3. Encrypts a victim's files and demands payment to decrypt them
- 6. Control to protect integrity of information
- 8. A system that monitors a network for suspicious activity