ICS- Review 1
Across
- 4. a criminal tactic using scam emails, texts, or calls to trick people into clicking malicious links, downloading malware, revealing sensitive information like passwords or financial details, or transferring money
- 6. the design of this malware is to hold a computer system or the data it contains captive until it makes a payment, usually encrypts your information so you can't access it.
- 8. You should also use this encrypted service to prevent others from intercepting your information over a public wireless network.
- 9. will log the detection and create an alert for a network administrator. It will not take action.
- 10. can block or deny traffic based on a positive rule or signature match.
- 11. (4,2,3) when a user is accessing data.
- 14. (4,2,6) when data is traveling through the network.
- 16. (12,8) attackers get their hands on organisations confidential documents, trade secrets, designs etc.
- 18. (4,10) is the formal process of continuously identifying and assessing risk to reduce the impact of threats and vulnerabilities.
- 19. (9,8) where you could backup or copy all your data to i.e. a NAS, or an external hard drive
Down
- 1. (6-2-7) attacks are a type of network attack that is relatively simple to carry out, even by an unskilled attacker. A DoS attack results in some interruption of network service to users, devices, or applications.
- 2. (12,6) is the loss to financial capital social capital and/or market share resulting from damage to an organization's reputation.
- 3. is a computer program that, when executed, replicates and attaches itself to other executable files, such as a document, by inserting its code. Usually require end-user interaction to initiate activation and can act on a specific date or time.
- 5. a Cyber Criminal may take control of an organization’s website posting untrue information, is one type of this activity.
- 7. (4,2,7) the financial impact of a security breach can
- 11. (4,2,4) when data is stored in a computer network or device.
- 12. may prevent the loss of irreplaceable data.
- 13. (6,11)is manipulating people into performing actions or divulging confidential information.
- 15. can have sophisticated security policies applied to the traffic passing through them. Can look deeper into the network traffic to block malicious behaviour.
- 17. a type of data breach where the goal is to take sensitive personal data.