Third Party Security

1234567
Across
  1. 5. A security method where information is encoded and can only be accessed or decrypted by a user with the correct type of key
  2. 7. A combination of letters, numbers and symbols used to access a system along with a username
Down
  1. 1. Any attempted or actual unauthorized access, use, disclosure, modification or destruction of information
  2. 2. Remote computing devices that communicate back and forth to a network that it’s connected to
  3. 3. The process of making a copy of the information typically stored in a system or on a device
  4. 4. A safeguard or countermeasure prescribed for an information system or organization
  5. 6. A measure of the extent to which an entity is threatened by a potential circumstance or event