Information Security

123456789
Across
  1. 1. hardware or software that helps keep hackers from using your computer to send out your personal information without your permission.
  2. 3. Use this tool to dispose of hard copy documents that contain (stricly) confidential information.
  3. 5. Do not __________ your password or account with anyone.
  4. 6. ID credentials
  5. 7. contact point in case of Information Security (near) incident.
  6. 9. an individual whose primary aim in life is to penetrate the security defences of large, sophisticated, computer systems
Down
  1. 2. conversion of electronic data into another form which cannot be easily understood by anyone except authorized parties.
  2. 3. form of fraud in which the attacker attempts to gather personal, financial or business confidential information.
  3. 4. malicious software that kidnaps your data
  4. 8. classic form of malware