Information System Security and Control
Across
- 3. Connecting a listening device to the circuit carrying information between phones
- 5. Actions traced to an individual to ensure that the person who makes data or system changes can be identified
- 6. These individuals constitute the majority of the threat community
- 7. Send the same message indiscriminately
- 9. Verifying the identity
- 13. Recognizing the consequences of risks in a deliberate and systematic way
- 15. Multiple systems flood the bandwidth
- 17. Smart cards and memory cards
- 18. Does the damage after it is implanted in some way into a target's computer
- 19. Without time
- 20. Natural phenomenon
Down
- 1. Exploit vulnerabilities and creates risk
- 2. Motivated to use their skills for political purposes
- 4. Weaknesses exploited, threat independent
- 8. Fingerprints, iris granularity, retina blood vessels, facial features, and hand geometry
- 10. Process of protecting a resource
- 11. Programs that search for and execute themselves in available host CPU processing memory
- 12. Honesty and truthfulness
- 14. Protective measures to reduce risks
- 16. Bring Your On Device