Fundamentals of CYbersecurity

123456789101112
Across
  1. 4. secrecy of the information
  2. 5. Involves a computer or computer network
  3. 7. Warning for malicious activity
  4. 8. control Role management and rule management
  5. 11. Weakness in information system
Down
  1. 1. assurance that the information received is exact and accurate
  2. 2. enables you to manage and secure your mobile workforce with app security, container app security and secure mobile mail.
  3. 3. Security measures for protecting a computer network from intruders, including both wired and wireless (Wi-Fi) connections.
  4. 6. Attempt to gain unauthorized access
  5. 9. Virtual component world
  6. 10. security triads
  7. 12. identify the user or system or the entity