Across
- 2. coding protecting information from hackers
- 4. the right to be let alone
- 8. a malware designed to deny a user or organization access to files on their computer
- 10. the art of protecting networks, devices, and data from unauthorized access
Down
- 1. (2 words) information about an individual
- 3. common examples are viruses and trojans
- 5. the process of identifying a user's identity
- 6. international organization for standardization
- 7. compromise of security
- 9. a set of policies and procedures for systematically managing an organization's sensitive data