Across
- 1. hardware or software that helps keep hackers from using your computer to send out your personal information without your permission.
- 3. Use this tool to dispose of hard copy documents that contain (stricly) confidential information.
- 5. Do not __________ your password or account with anyone.
- 6. ID credentials
- 7. contact point in case of Information Security (near) incident.
- 9. an individual whose primary aim in life is to penetrate the security defences of large, sophisticated, computer systems
Down
- 2. conversion of electronic data into another form which cannot be easily understood by anyone except authorized parties.
- 3. form of fraud in which the attacker attempts to gather personal, financial or business confidential information.
- 4. malicious software that kidnaps your data
- 8. classic form of malware
