Across
- 2. Is about making sure the information, systems and processes are protected from malicious intentional or accidental modification
- 4. Principle where authorized users are able to access systems and data when and where possible. On the other hand, unauthorized users should be denied access
- 5. The process of translating a given key into a code
- 6. A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event
- 7. The most common type of social engineering.It exploits human error or gullibility to harvest credentials or spread malware.
- 8. A way of scrambling data so that only authorized parties can understand the information
Down
- 1. Set of rules that prevent sensitive information being disclosed by unauthorized people.
- 3. It describes a wide range of programs or files that could damage a computer or system. They can do multiple things, such as: steal or encrypt data, alter computing functions or even monitor users.
