Across
- 6. principle of keeping data accurate and unchanged. (9 letters)
- 7. program that spreads by attaching to files. (5 letters)
- 8. secret used to access systems. (8 letters)
- 9. security item to secure doors. (5 letters)
- 11. designed to damage or disrupt. (7 letters)
- 14. accounts with two or more verification steps. (3 letters)
- 15. document defining how data is handled. (6 letters)
Down
- 1. who gains unauthorized access. (6 letters)
- 2. review of systems for compliance and risks. (5 letters)
- 3. information unreadable without a key. (11 letters)
- 4. control that limits who can see or use data. (9 letters)
- 5. messages used to trick people into giving data. (8 letters)
- 10. hidden malicious program disguised as useful. (6 letters)
- 12. where someone pretends to be another user. (11 letters)
- 13. systems and networks from attacks. (10 letters)
