INFORMATION AND NEWTORK SECURITY

1234567891011
Across
  1. 4. One of the CIA triad pillars that ensures data accuracy.
  2. 5. A life cycle that integrates security into software development.
  3. 8. Structured process for building secure systems.
  4. 9. The person responsible for company-wide information security.
  5. 10. Protecting data from tampering or deletion ensures this CIA component.
  6. 11. Set of hardware, software, people, and data.
Down
  1. 1. The unauthorized act of tricking people to gain confidential data.
  2. 2. A major type of threat that comes from nature.
  3. 3. The weakest link in information security.
  4. 5. An attack that injects malicious code into a database query. (3 letters)
  5. 6. A principle of InfoSec that ensures only authorized access to data.
  6. 7. Malicious attempt to disrupt normal system traffic.