Across
- 5. A security method where information is encoded and can only be accessed or decrypted by a user with the correct type of key
- 7. A combination of letters, numbers and symbols used to access a system along with a username
Down
- 1. Any attempted or actual unauthorized access, use, disclosure, modification or destruction of information
- 2. Remote computing devices that communicate back and forth to a network that it’s connected to
- 3. The process of making a copy of the information typically stored in a system or on a device
- 4. A safeguard or countermeasure prescribed for an information system or organization
- 6. A measure of the extent to which an entity is threatened by a potential circumstance or event
