Infosec
Across
- 4. Your system can remain secured only if it has the latest __________.
- 6. potential that an action or activity will lead to a loss
- 9. A group of your colleagues who assists you in securely evacuating in any emergency situation.
- 12. FAI Information security documents are made available to users on
- 13. important in computers and networks
- 14. a breach in security, such as unauthorized access to data
- 15. or malware is a file or program other then a virus that is potentially harmful.
- 19. Entering premises without swiping your access card by following someone else.
- 20. any information about an individual which can be used to uniquely identify that person, e.g. name, date and place of birth, mother’s maiden name, social security number is ............. Identifiable Information
- 21. is software designed specifically to detect, disable, and remove viruses, worms, and Trojans before they infect a computer
- 22. Ensure that authorised user have access to information & associated assets when required.
- 24. emailID to report security incidents
- 27. list of permissions that tells an operating system which users have access rights to objects, and what operation they are allowed to perfom on those objects
- 28. is a self-replicating program that is harmful to networks.
- 29. is a form of attack that prevents users from accessing normal services, such as e-mail and a web server
- 30. who is responsible for security
- 33. I am not authorized to install applications and software that are
Down
- 1. Independent review of how well you are following and complying with the standards and policies.
- 2. visitors need to be
- 3. Organization’s preparedness program for handling disruptions.
- 4. of death is a series of repeated, larger than normal pings that crash the receiving computer.
- 5. If you access a computer systems without the owner’s knowledge and approval, you are committing a _____
- 6. is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
- 7. is used to discard hard copies of confidential data.
- 8. Password must be always kept _______ .
- 10. is ensuring the accuracy and completeness of Information.
- 11. Ensuring the information is accessible only to those authorised have access.
- 16. is a program written with malicious intent and sent out by attackers.
- 17. Programming language that allows applets to run within a web browser.
- 18. The scrambling of data into a secret code that can be read only by software set to decode the information.
- 23. Your activities on the network can be ____________ by the company.
- 25. is a software program that displays advertising on your computer.
- 26. these set out the technical controls required to achieve the policy objeclives
- 30. Social Media provides an efficient means for criminals to mine both personal and company data. Social ______ work to gain based on information they have obtained from these social networks or victim themselves
- 31. abbreviation for voice communications over internet networks
- 32. anything of value, such as source code, processes, hardware, people etc.