Information Security

12345678910111213141516
Across
  1. 1. to or damage sensitive information on a computer
  2. 4. of computers and devices managed as a unit with the same procedures
  3. 8. ransomware and the numerous other programs used by hackers to gain
  4. 11. sure a person is who they say they are
  5. 12. an individual or organization has over information and how it is used
  6. 14. assessment of potential threats to an organization’s security
  7. 15. Virus-macros which have been programmed to carry out malicious intent
  8. 16. rules
Down
  1. 2. of being private or secret
  2. 3. of being complete or uncorrupted
  3. 5. or weakness which undermines an organization’s security efforts
  4. 6. or data which can be accessed when needed
  5. 7. used to determine user privileges or access levels to the system
  6. 9. information is protected
  7. 10. of doing harm
  8. 13. short for "malicious software" and covers threats such as viruses, worms, Trojan