information security

12345678910111213141516
Across
  1. 3. making sure a person is who they say they are
  2. 7. intent of doing harm
  3. 8. Virus- macros which have been programmed to carry out malicious intent
  4. 9. network of computers and devices managed as a unit with the same procedures
  5. 10. requirement of being private or secret
  6. 11. short for "malicious software" and covers threats such as viruses, worms, Trojan
  7. 12. how information is protected
  8. 14. information or data which can be accessed when needed
Down
  1. 1. gap or weakness which undermines an organization’s security efforts
  2. 2. state of being complete or uncorrupted
  3. 4. procedure used to determine user privileges or access levels to the system
  4. 5. rights an individual or organization has over information and how it is used
  5. 6. ransomware and the numerous other programs used by hackers to gain
  6. 13. calculated assessment of potential threats to an organization’s security
  7. 15. to or damage sensitive information on a computer
  8. 16. rules