Cyber
Across
- 3. Attack that attempts to put a machine into request overload to the point of making it impossible to deliver the requested services
- 4. Probability x Impact
- 5. It helps validate identity for access to an application or data via something you know, have or are
- 6. Who oversees the compliance
- 9. First step in the risk management process
- 13. Fraudulent attempt to obtain sensitive information or data by disguising oneself as a trustworthy entity in an electronic communication
- 14. Kind of data, like a fingerprint
- 15. It helps control and manage access to applications, data and networks by internal staff and external individuals and organisations
- 21. Guarantee that the information receiver can confirm the identity of the sender
- 23. Ensure that the origin of data can be deduced with certainty
- 25. Proactively monitors the network and endpoints for threats, and includes analytics and event correlation capabilities to improve response speeds
- 26. Gateway device that monitors and controls incoming and outgoing network traffic
- 27. Type of software that is specifically designed to cause harm to a computer system, network, or device
- 28. Attacker’s attempt to send data to an application in a way that will change the meaning of commands being sent to an interpreter
- 30. The consent for email marketing should be…
Down
- 1. European regulation on the processing of personal data
- 2. It should be following a data breach
- 4. Type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability
- 6. It helps you identify and minimise the data protection risks of a project
- 7. A phase of Cyber Kill Chain Attack
- 8. It allows an attacker to coerce the application to send a crafted request to an unexpected destination
- 10. Legal document provided to users about individual rights about data processing
- 11. It usually allows to process data
- 12. Technique for identifying the password through the use of all possible combinations of characters
- 16. It helps ensuring the efficiency and effectiveness of business processes by ensuring the well-being of the company
- 17. Data is unable to be referred to an individual
- 18. It is achieved when data are not changed improperly
- 19. It delivers faster response times, with streamlined and automated incident response workflows
- 20. Person who acts for ideology purposes
- 22. Any person other than the Data Subject, Data Controller or Data Processor
- 24. It specifies the requirements for establishing, carrying out, maintain and continuously improve a management system for information security
- 29. Hardware and software responsible of monitoring and/or control of physical devices, processes and events in the enterprise