Cyber Security and Laws

1234567891011
Across
  1. 3. subscription fraud can be achieved by sending "----- " requests to subscribers via the SS7 / GTP protocols
  2. 4. EDI internet transmission protocols include ----- File Transfer Protocol (SFTP),
  3. 6. Cyber ------ is use of the Internet or other electronic means to track someone
  4. 7. The International Organization for ------- is referred as ISO
  5. 9. EDI, which stands for electronic data interchange, is the intercompany ----------- of business documents in a standard format.
  6. 10. GLBA is a United States federal law that requires ------ institutions to explain how they share and protect their customers’ private information
  7. 11. is just one of the many frauds on the Internet, trying to fool people into parting with their money
Down
  1. 1. PCI DSS is an acronym for “----- Card Industry Data Security Standard.”
  2. 2. Counteracting cybercrime is ------------- , a technique used to protect computers, networks, programs, and data from exploitation.
  3. 4. The ----- System 7 (SS7) industry standard and set of protocols were developed in 1975
  4. 5. refers to the use of a computer to commit a crime
  5. 8. is the legal process by which an arbiter or judge reviews evidence and argumentation.