Joshua Crossword Puzzle

1234567891011
Across
  1. 3. - A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
  2. 4. - is the process of detecting and preventing illegal or unauthorized use of a computer
  3. 5. - is ensuring that the information is accessible to authorized persons when required without delay.
  4. 7. - includes the applications on the computers and operating system.
  5. 9. theft - Any action of stealing information from a users system.
  6. 10. - An individual who breaks into computer systems to steal, change, or destroy information.
  7. 11. - An action or event that has the potential to compromise and/or violate security.
Down
  1. 1. - A defined method of breaching the security of an IT system through vulnerability.
  2. 2. - refers to protecting personnel, hardware, programs, networks, and data from physical threats.
  3. 6. Any action derived from intelligent threats to violate the security of the system.
  4. 8. preventing intruders from accessing any part of a computer system.