Information security

12345678910111213141516
Across
  1. 1. short for "malicious software" and covers threats such as viruses, worms, Trojan
  2. 4. intent of doing harm
  3. 7. how information is protected
  4. 9. state of being complete or uncorrupted
  5. 10. gap or weakness which undermines an organization’s security efforts
  6. 11. rules
  7. 12. macros which have been programmed to carry out malicious intent
  8. 13. information or data which can be accessed when needed
  9. 15. requirement of being private or secret
  10. 16. ransomware and the numerous other programs used by hackers to gain
Down
  1. 2. making sure a person is who they say they are
  2. 3. calculated assessment of potential threats to an organization’s security
  3. 5. procedure used to determine user privileges or access levels to the system
  4. 6. network of computers and devices managed as a unit with the same procedures
  5. 8. rights an individual or organization has over information and how it is used
  6. 14. to or damage sensitive information on a computer