Across
- 2. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- 4. the process of converting information or data into a code, especially to prevent unauthorized access.
- 6. software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
- 7. a verbal, written, or recorded communication sent to or left for a recipient who cannot be contacted directly.
- 9. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
- 10. network security device that monitors and filters incoming and outgoing network traffic
- 11. good privacy an open source and freely available software package for email security
Down
- 1. a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
- 3. The conversion of encrypted data into its original form
- 5. Assurance that the confidentiality of, and access to, certain information about an entity is protected.
- 8. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information