IS and BC Cross-Up Crossword

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647
Across
  1. 4. This “yummy” treat is generated by a web server and saved to your computer after visiting a website; you can also say no, I’m on a diet.
  2. 6. _______ Authentication requires more than just a password; usually also needs a token or a generated access code or token (two words).
  3. 8. Harmful computer programs such as viruses, worms, and trojans are used by hackers to gain access to your computer and cause destruction.
  4. 10. Sending an email, posting photos on a social media site and using your webcam.
  5. 11. Equipment that offers short term protection against power surges and power outages (acronym).
  6. 12. conforming to a rule, such as a specification, policy, standard or law.
  7. 14. Your ________ device often contains more personal information than any other source.
  8. 15. “ This too good to be true email gives off a false sense of ______”.
  9. 18. When calls are made by social engineering, they are called _____ .
  10. 20. A crime where a computer is the object of the crime or is used as a tool to commit an offense.
  11. 21. Where do UTC employee report their ICT issues (three words).
  12. 23. Always _______your computer when you leave your desk.
  13. 25. Facebook and TikTok are types of ________ (two words).
  14. 26. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  15. 27. A major business disruption; the earth moves, shifts and shakes.
  16. 29. Who can be the target of a cyber attack.
  17. 30. Never use your TTUTC________address for personal usage.
  18. 32. Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc; or you could eat it.
  19. 34. A fraudulent email purportedly from a reputable company attempting to get personal information.
  20. 35. You can call 999, 881 or 990 for _______ services.
  21. 40. The designated area at which employees, visitors and contractors assemble if evacuated from their building/site; The promenade for example (two words).
  22. 41. This horse can stampede our security defenses for the bad guys and make us look sheepish too!! (two words).
  23. 42. The address of a webpage. Check the validity of it before clicking on it (acronym).
  24. 43. __________ setting helps control things like your Profile, Contacts, and other information relating to your account.
  25. 45. a malicious party impersonates another device or a user in a network to launch attacks against network hosts, steal data, spread malware, or even bypass access controls.
  26. 47. BCP's main focus is not preventing incidents but rather the __________ from it.
Down
  1. 1. The process of adding allowed programs to a list is called_________.
  2. 2. sometimes you ask me to use my eye or voice or finger to identify or to grant access to systems, devices or data.
  3. 3. __________ Edwards is the Recovery Director and is in charge of BCP.
  4. 5. An asset like other essential business assets in the Corporation.
  5. 7. My nickname is Garbage Pail Kid .I am always _________ searching through trash to retrieve sensitive information (two words).
  6. 9. The staff and the customers are considered.
  7. 13. A technology that allows us to access our files through the internet from anywhere in the world.
  8. 16. A list of entities that are blocked or denied privileges or access.
  9. 17. The art of manipulating people to get access to sensitive information (two words.
  10. 19. Choose a password that is easy for you to ____________ but hard for you someone to guess.
  11. 22. information such as legal documents and contracts must be classified as __________information. - (restricted)
  12. 24. A collection of computers that are controlled on the same network.
  13. 28. A concept where all things are connected to the internet; household items usually (three words).
  14. 31. A piece of code put in to correct an error.
  15. 33. The global system of interconnected computer networks that link billions of devices.
  16. 34. Choose the strongest password is password345 , Passw0rd123, P@$sW0rD32!, Pa$$worD562.
  17. 36. Communication test done by teams to ensure that each person can be reached in the event of an emergency (two words).
  18. 37. The Corporation has a _________policy which states all workspaces must be cleared of sensitive documents if unattended (two words).
  19. 38. someone who seeks and exploits weaknesses in a computer system or computer network.
  20. 39. The UTC hotsite is located here.
  21. 44. Usually comprises the display device of the computer.
  22. 46. Non-ICT Security Incidents such as unauthorized data usage and disclosure must be reported to the ______________ Department (acronym).