Information Security

123456789
Across
  1. 2. The practice of securing communication and data in the presence of adversaries.
  2. 5. - Providing proof of the origin or delivery of data to protect against denial by one of the parties involved.
  3. 6. - Ensuring that data remains unchanged from its source and has not been accidentally or maliciously modified, altered, or destroyed.
  4. 7. - The methodical approach to managing the aftermath of a security breach or cyber attack, also known as an IT incident, computer incident, or security incident.
  5. 9. - Protecting information from being accessed by unauthorized parties.
Down
  1. 1. Determining what permissions an authenticated user has within a system.
  2. 2. - Adhering to laws and regulations relating to protecting and managing data.
  3. 3. - The process of identifying, assessing, and controlling threats to an organization's digital assets.
  4. 4. The process of verifying the identity of a user, device, or system.
  5. 8. - The practice of gathering, analyzing, and reporting on data in a way that is legally admissible.