IT SECURITY

1234567891011
Across
  1. 2. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
  2. 4. the process of converting information or data into a code, especially to prevent unauthorized access.
  3. 6. software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. 7. a verbal, written, or recorded communication sent to or left for a recipient who cannot be contacted directly.
  5. 9. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
  6. 10. network security device that monitors and filters incoming and outgoing network traffic
  7. 11. good privacy an open source and freely available software package for email security
Down
  1. 1. a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
  2. 3. The conversion of encrypted data into its original form
  3. 5. Assurance that the confidentiality of, and access to, certain information about an entity is protected.
  4. 8. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information