Across
- 5. intent of doing harm
- 7. requirement of being private or secret
- 8. procedure to determine user privileges or access to programs
- 12. info or data which can be accessed when needed
- 13. gap or weakness which undermines an organization's security
Down
- 1. network of computers and devices managed as a unit with procedures and rules
- 2. how information is protected
- 3. short for "malicious software" and covers threats such as viruses, worms, Trojan horse, ransom ware,and the numerous other programs used by hackers to gain or access or damage computer programs
- 4. macros which have been coded with malicious intent
- 6. calculated assessment of potential threats to an organizations security
- 9. making sure a person is who they say they are
- 10. state of being complete or uncorrupted
- 11. rights an individual or organization has over info and how it is used
