Across
- 7. makes sure users are who they say
- 9. used to hack
- 11. who does security build trust with
- 12. sensitive data that is not tampered with
- 15. business managers who categorize decides authorization
- 16. management instructions on how things should run
- 17. facts, recorded observation, statistics
- 18. hackers go after what
- 20. if your password has 8 characters/ alphabetic + numeric
Down
- 1. installation malware, entry into internal systems
- 2. users given access to sensitive info
- 3. note taking app
- 4. browser based
- 5. proof that a transfer was successful
- 6. only users who need access to info have access
- 8. cloud storage
- 10. physical access
- 13. voice over internet protocol
- 14. authorized access to info
- 19. where does security start
