Across
- 2. A term for information
- 4. This general term for security practices relating to computers
- 6. A style of attack that is used to gather data, information, or other knowledge to gain unwarranted access
- 7. This tool allows an individual to identify themselves as a specific person, granting them access to systems particular to them
Down
- 1. This complex string of characters is used to log-in to a device, service, or other secure
- 3. A term relating to an outside entity that in some way supports an organization (e.g. Workday is a third-party for JMS)
- 5. A recent technological development, where a machine can "think" and/or "learn" based off the information you provide.
