Data Protection
Across
- 2. To gather compromised information and/or defense secrets
- 8. Individuals who want to attack computers yet lack the knowledge
- 10. Following a victim with authorized credentials through a door or other secure building access point
- 11. Data at rest
- 12. Visually capturing logins or passwords or other sensitive information over someone's ______ while using a computer.
- 13. Designed to hold a computer system or the data it contains captive until a payment
- 17. A security breach can have a negative long-term impact on an organization’s _________
- 18. More targeted version of the phishing
- 20. Employees, contract staff or trusted partners
- 22. Telling a computer to perform some task using CLI
- 24. Cyberwarfare can destabilize a nation
Down
- 1. an attacker establishes trust with their victim by impersonating persons who have right-to-know authority
- 2. Preventing unwanted changes or alteration
- 3. Network, Devices, Power Grid, Roads
- 4. Data traveling between information systems
- 5. A broad range of malicious activities accomplished through psychological manipulation of people into performing actions or divulging confidential information.
- 6. Core Principles of Cybersecurity
- 7. Get victims to click on links to malicious websites, open attachments that contain malware or reveal sensitive information.
- 9. Using technology to penetrate and attack another nation’s computer systems and networks in an effort to cause damage or disrupt services
- 14. Amateurs or skilled attackers outside of the organization
- 15. Data developed around the user without their express input, usually generated based on search histories, content consumption, purchases, and social media activity
- 16. Breaks into networks or computer systems to identify and improve any weaknesses
- 19. Technique used on unshredded documents
- 21. Make political statements in order to raise awareness about issues
- 23. Using a false promise to gain a victim’s interest to lure them into a trap that steals their personal information or infects their systems