Crossword activity: Find the threat!

1234567891011121314
Across
  1. 1. Security implementation involves four complementary courses of action: prevention, detection, response, and _.
  2. 4. Don’t use the same _ on different sites and change it regularly.
  3. 6. Cyber _ includes single actors or groups targeting systems for financial gain or to cause disruption.
  4. 7. _ is used to protect the application by filtering and monitoring incoming and outgoing traffic between web application and the internet.
  5. 10. _ security protects the integrity and privacy of data, both in storage and in transit.
  6. 12. A loss of _ is the disruption of access to or use of information or an information system.
  7. 13. _ is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
  8. 14. A _ is set on the boundaries of any system or network which monitors and controls network traffic.
Down
  1. 2. _ security refers to the protection of hardware, software, and data from attackers.
  2. 3. _ security includes the processes and decisions for handling and protecting data assets.
  3. 5. The assets of a computer system can be categorized as hardware, software, communication lines and networks, and _.
  4. 8. Data leakage is an unauthorized transfer of _ to the outside world.
  5. 9. Avoid using unsecure _ networks in public places
  6. 11. A(n) _ is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat consequence.
  7. 13. _ is a malware that aims to steal data about the organization or person.