June 2020 Newsletter Crossword Puzzle

12345678910
Across
  1. 2. Occurs when an employee shares personally identifiable information about a single or relatively small number of people to an unauthorized recipient.
  2. 5. An alternate way of accessing a system. Malware might add a backdoor to a system after infecting it.
  3. 7. Inactive data that is physically stored on media such as a hard drive, laptop, flash drive, or archived/stored another way.
  4. 8. Data that is actively moving from one location to another via the Internet or over a network.
  5. 9. Practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks by cyber criminals.
  6. 10. Process that occurs when a user proves identity, such as using a personal identity verification card and/or password.
Down
  1. 1. The result of taking plaintext and encrypting it.
  2. 3. Grants authorized users the right to use a service while preventing access to non-authorized users.
  3. 4. A list of applications that users are allowed to install and run on their computers.
  4. 6. A password attack that attempts to guess a password.