Cyber

123456789101112131415161718192021222324252627282930
Across
  1. 3. Attack that attempts to put a machine into request overload to the point of making it impossible to deliver the requested services
  2. 4. Probability x Impact
  3. 5. It helps validate identity for access to an application or data via something you know, have or are
  4. 6. Who oversees the compliance
  5. 9. First step in the risk management process
  6. 13. Fraudulent attempt to obtain sensitive information or data by disguising oneself as a trustworthy entity in an electronic communication
  7. 14. Kind of data, like a fingerprint
  8. 15. It helps control and manage access to applications, data and networks by internal staff and external individuals and organisations
  9. 21. Guarantee that the information receiver can confirm the identity of the sender
  10. 23. Ensure that the origin of data can be deduced with certainty
  11. 25. Proactively monitors the network and endpoints for threats, and includes analytics and event correlation capabilities to improve response speeds
  12. 26. Gateway device that monitors and controls incoming and outgoing network traffic
  13. 27. Type of software that is specifically designed to cause harm to a computer system, network, or device
  14. 28. Attacker’s attempt to send data to an application in a way that will change the meaning of commands being sent to an interpreter
  15. 30. The consent for email marketing should be…
Down
  1. 1. European regulation on the processing of personal data
  2. 2. It should be following a data breach
  3. 4. Type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability
  4. 6. It helps you identify and minimise the data protection risks of a project
  5. 7. A phase of Cyber Kill Chain Attack
  6. 8. It allows an attacker to coerce the application to send a crafted request to an unexpected destination
  7. 10. Legal document provided to users about individual rights about data processing
  8. 11. It usually allows to process data
  9. 12. Technique for identifying the password through the use of all possible combinations of characters
  10. 16. It helps ensuring the efficiency and effectiveness of business processes by ensuring the well-being of the company
  11. 17. Data is unable to be referred to an individual
  12. 18. It is achieved when data are not changed improperly
  13. 19. It delivers faster response times, with streamlined and automated incident response workflows
  14. 20. Person who acts for ideology purposes
  15. 22. Any person other than the Data Subject, Data Controller or Data Processor
  16. 24. It specifies the requirements for establishing, carrying out, maintain and continuously improve a management system for information security
  17. 29. Hardware and software responsible of monitoring and/or control of physical devices, processes and events in the enterprise