Across
- 6. Short for malicious software designed to obtain information from a computer without the user's consent
- 7. Protection of information assets within internetworked information systems
- 9. Ensures the timely and reliable access and use of information systems
- 10. Full use of a vulnerability for the benefit of an attacker
Down
- 1. Protection of information from authorized access and disclosure
- 2. A protected string of characters that authenticate a computer user to a system
- 3. the process of taking an unencrypted message and applying a mathematical function to produce an encrypted message
- 4. The protection of information from unauthorized modification
- 5. A system or combination of systems that enforces a boundary between two or more networks
- 8. An individual who attempts to gain unauthorized access to a computer system