Network Security

123456
Across
  1. 2. A document most organisations have to minimise security risks.
  2. 3. Way of checking to see how secure a network is by employing legitimate hackers.
  3. 4. A way of turning data into an unreadable form, requiring a key before it can be read.
  4. 5. A method used to restrict access based upon the person using the computer system.
Down
  1. 1. Describes the process of investigating a hack to find the culprit.
  2. 3. A simple way of restricting access to a network or files.
  3. 6. Type of software used to guard against malware attacks.