Information Security

123456789
Across
  1. 2. when attackers use various methods/tricks to get
  2. 4. actually purging the data; permanently losing the
  3. 5. software used to prevent, detect, and remove malware
  4. 7. testing to see if system vulnerabilities can be exploited in order to actually gain access to systems, the network, data and so forth; acts in a way that an attacker might act
  5. 9. when someone gains entrance/access by
Down
  1. 1. on the tailcoats of an authorized person
  2. 3. information from unsuspecting persons
  3. 6. used to perform authentication; a username,a certificate,or a token
  4. 8. Identifying risks to understand the risks that we are exposed to