Module 1 Test

12345678910
Across
  1. 4. attack that will publish or withhold data unless money is paid
  2. 6. this triad is widely accepted security measure
  3. 7. using phone calls and voicemails to gain personal information
  4. 8. using deceptive emails to gain personal information
  5. 10. protection from unauthorized people making changes
Down
  1. 1. Identity theft, stealing money, stealing private information, controlling private computers
  2. 2. protection of computer systems, networks, and data from digital attacks
  3. 3. with "of things" means that so much of our devices are connect to the internet
  4. 5. assurance that systems and data will be able to be accessed
  5. 9. protection from people not authorized to view