information security

1234567891011121314
Across
  1. 3. Virus macros which have been programmed to carry out malicious intent
  2. 5. gap or weakness which undermines an organization’s security efforts
  3. 6. rights an individual or organization has over information and how it is used
  4. 9. requirement of being private or secret
  5. 13. intent of doing harm
  6. 14. making sure a person is who they say they are
Down
  1. 1. short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain
  2. 2. information or data which can be accessed when needed
  3. 4. procedure used to determine user privileges or access levels to the system
  4. 7. state of being complete or uncorrupted
  5. 8. how information is protected
  6. 10. network of computers and devices managed as a unit with the same procedures and rules
  7. 11. to or damage sensitive information on a computer
  8. 12. calculated assessment of potential threats to an organization’s security