Across
- 2. A document most organisations have to minimise security risks.
- 3. Way of checking to see how secure a network is by employing legitimate hackers.
- 4. A way of turning data into an unreadable form, requiring a key before it can be read.
- 5. A method used to restrict access based upon the person using the computer system.
Down
- 1. Describes the process of investigating a hack to find the culprit.
- 3. A simple way of restricting access to a network or files.
- 6. Type of software used to guard against malware attacks.
