ICSS Unit 6

12345678910111213141516
Across
  1. 5. Data cleansing will eliminate data that are ________.
  2. 6. DNC Registry allows one to opt out of receiving __________ calls and messages
  3. 9. Operational _______ refers to business disruption as a result of data breach.
  4. 11. Operational security is also known as _______ security.
  5. 12. A common form of MFA is two-factor __________.
  6. 13. What type of system is required to keep customers' data secure?
  7. 15. One way to ethically gain customer data is through a ________ survey.
  8. 16. DTMF will mask the tones so that attacker will not be able to decipher the _______ frequency of the credit card details that was keyed in.
Down
  1. 1. ______ loggers steal login credentials and sensitive enterprise data.
  2. 2. Patch updates could be delayed due to undiscovered __________ before a major software update.
  3. 3. One of the consequences of security breach is ______ damage.
  4. 4. Trojans are malicious programs disguised as ________ ones.
  5. 7. PDDA stands for Personal Data ________ Act
  6. 8. Telephony ______ of services attack is an attempt to make telephone system unavailable to users.
  7. 10. Too much data is also known as data ______.
  8. 14. They key concepts of PDPA are consent, reasonableness and ________.