Cybersecurity fun

123456789101112131415
Across
  1. 4. legal constraints that govern how data can be used or stored. Permission is often required from individual as to these elements
  2. 6. possibility of undesired outcome occurring
  3. 7. information classification
  4. 8. Electronic or digital method to control how devices operate or control how they can or can not be used
  5. 11. any security incident where sensitive, protected, or confidential data is accessed or stolen by an unauthorized party
  6. 14. the original form of a message
  7. 15. protect before an event happens
Down
  1. 1. all the information on a website
  2. 2. a conventional type of encryption
  3. 3. the process of adding our signature to the document to show integrity
  4. 5. someone who is responsible for developing algorithms and ciphers to encrypt sensitive data and may work together with a security software developer in developing security systems
  5. 9. a process of encoding a message so that its meaning is not obvious
  6. 10. the a in CIA triad
  7. 12. ways to protect vulnerabilities
  8. 13. copies of data