Information Security

12345678910111213
Across
  1. 2. rights an individual or organization has over information and how it is used
  2. 6. calculated assessment of potential threats to an organization’s security
  3. 8. procedure used to determine user privileges or access levels to the system
  4. 9. gap or weakness which undermines an organization’s security efforts
  5. 10. short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer
  6. 11. intent of doing harm
  7. 12. requirement of being private or secret
Down
  1. 1. how information is protected
  2. 3. information or data which can be accessed when needed
  3. 4. macros which have been programmed to carry out malicious intent
  4. 5. making sure a person is who they say they are
  5. 7. network of computers and devices managed as a unit with the same procedures and rules
  6. 13. state of being complete or uncorrupted