Chapter 3 Activity

1234567891011121314151617181920212223242526272829
Across
  1. 2. Phishing in which the victims receive a voice-mail message telling them to call a phone number or access a website
  2. 3. A harmful program that resides in the active memory of the computer and duplicates itself
  3. 6. The deployment of malware that steals data from government agencies, military contractors, political organizations, or manufacturing firms
  4. 12. What organization is mentioned as a resource for cybersecurity guidance?
  5. 14. An attack on an information system that takes advantage of a particular system vulnerability
  6. 15. Software that generates and grades tests that humans can pass but computer programs cannot
  7. 17. The process of scrambling messages or data in such a way that only authorized parties can read it
  8. 19. What federal agency is responsible for protecting U.S. cyber infrastructure?
  9. 21. Defines an organization’s security requirements, as well as the controls and sanctions needed to meet those requirements.
  10. 22. Perpetrators: Launches computer-based attacks against other computers or networks in an attempt to intimidate or coerce an organization in order to advance certain political or social objectives.
  11. 25. The process of assessing security-related risks to an organization’s computers and networks from both internal and external threats.
  12. 26. A set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge
  13. 27. An attack that occurs before the security community is aware of a vulnerability
  14. 28. Perpetrators: Someone who violates computer or Internet security maliciously or for illegal personal gain
  15. 29. Federal Laws: Addresses fraud and related activities in association with computers
Down
  1. 1. Software and/or hardware that monitors system resources and activities and issues an alert when it detects network traffic attempting to circumvent security measures
  2. 2. A specific sequence of bytes that indicates the presence of a previously identified virus
  3. 4. What type of phishing specifically targets an organization's employees?
  4. 5. Malware that encrypts data and demands a ransom
  5. 7. What does BYOD mean?
  6. 8. A system of software and/or hardware that stands guard between an organization’s internal network and the Internet
  7. 9. What type of attack floods a target with data requests to make a site unavailable?
  8. 10. Many organizations use this to monitor, manage, and maintain their computer and network security
  9. 11. Enables remote users to securely access an organization’s computing resources and share data by transmitting and receiving encrypted data over public networks, such as the Internet
  10. 13. Perpetrators: An individual whose goal is to promote a political ideology
  11. 16. Confidentiality, Integrity, Availability
  12. 18. Federal Laws: Defines cyberterrorism and associated penalties
  13. 20. Phishing using SMS
  14. 23. A networking device that connects multiple networks and transmits data packets between networks
  15. 24. What type of malware disguises itself as legitimate software?