Infosec
Across
- 2. ____________allows continuity of business in terms of data availability in case of disaster
- 5. In QualityKiosk, Emails should be used for _____ use only
- 8. In QualityKiosk, password must be _____ characters
- 9. What refers to the protection of information from unauthorized modification or destruction
- 10. What A is CIA Triad
- 13. _____ is the most common delivery method for viruses
- 14. As per password policy, password should be changed within ______ days
- 15. An _______ can be the result of unusual circumstances as well as the violation of existing policies and procedures of QualityKiosk
Down
- 1. What consists of code developed by cyber attackers, designed to cause extensive damage to data and systems, or to gain unauthorized access to a network
- 3. Social engineering is trick used by an attacker to access ______ information
- 4. _______ is one of the social engineering attacks that targets victims computer
- 6. ______ helps protect your computer against malware and viruses
- 7. What is the highest level of information classification defined at QK?
- 11. The first step in security awareness is being able to ______ a security threat
- 12. Poor security can place information at ___