Across
- 2. Occurs when an employee shares personally identifiable information about a single or relatively small number of people to an unauthorized recipient.
- 5. An alternate way of accessing a system. Malware might add a backdoor to a system after infecting it.
- 7. Inactive data that is physically stored on media such as a hard drive, laptop, flash drive, or archived/stored another way.
- 8. Data that is actively moving from one location to another via the Internet or over a network.
- 9. Practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks by cyber criminals.
- 10. Process that occurs when a user proves identity, such as using a personal identity verification card and/or password.
Down
- 1. The result of taking plaintext and encrypting it.
- 3. Grants authorized users the right to use a service while preventing access to non-authorized users.
- 4. A list of applications that users are allowed to install and run on their computers.
- 6. A password attack that attempts to guess a password.