Across
- 3. a type of storage device retains the data when no user or process is using it.
- 5. cyber criminals can capture, save and steal data in-transit.
- 9. uses removable media to physically move data from one computer to another.
- 10. procedures, and guidelines that enable the citizen of the cyber world to stay safe and follow good practices.
- 12. devices, and product available to protect information systems and fend off cyber criminals.
- 14. verifies the identify of a user to prevent unauthorized access.
- 15. uses cable to transmit data.
Down
- 1. verifies determine which resources users can access, along with the operations that users can perform.
- 2. is the principle used to describe the need to maintain availability of information systems and services at all times.
- 4. involves sending information from one device to another.
- 5. cyber criminals can use rogue or unauthorized devices to interrupt data availability.
- 6. cyber criminals can intercept and alter data in-transit.
- 7. aware and knowledgeable about their world and the dangers that threaten their world.
- 8. keeps tracks of what users do, including what they access, the amount of time they access resources, and any changes made.
- 11. prevents the disclosure of information to unauthorize people, resource and processes.
- 13. uses the airways to transmit data.