Across
- 2. Copies from one computer to the next to deplete memory and overwhelm network traffic
- 5. A program to convert data prior to and after transmission
- 7. Use of a software to eavesdrop on information sent and received by user
- 8. Formal standards that have been assessed and approved
- 9. Information Security goal to ensure data accuracy
Down
- 1. The unauthorized intrusion of the computer network for tempering
- 3. To delete data and application without physical access
- 4. The objective is to separate internal and external network and prevent passage of specific types of traffic
- 5. To ensure that a policy is being followed
- 6. Type of encryption that requires two keys
