Across
- 4. software tool designed to detect and remove malicious software
- 5. Formal review to ensure that security measures are effective and policies are followed
- 7. A strategy for protecting sensitive data while it’s being transmitted across networks
- 10. framework for managing organizational risks
Down
- 1. The process of verifying the identity of a user or system
- 2. Information that directly or indirectly links to a person is considered
- 3. A system used to monitor and control network traffic
- 6. legal requirement for companies processing EU citizens’ data.
- 8. An international standard for information security management systems.
- 9. cyberattack that floods a network to make it unavailable.
