IS and BC Cross-Up Crossword
Across
- 4. This “yummy” treat is generated by a web server and saved to your computer after visiting a website; you can also say no, I’m on a diet.
- 6. _______ Authentication requires more than just a password; usually also needs a token or a generated access code or token (two words).
- 8. Harmful computer programs such as viruses, worms, and trojans are used by hackers to gain access to your computer and cause destruction.
- 10. Sending an email, posting photos on a social media site and using your webcam.
- 11. Equipment that offers short term protection against power surges and power outages (acronym).
- 12. conforming to a rule, such as a specification, policy, standard or law.
- 14. Your ________ device often contains more personal information than any other source.
- 15. “ This too good to be true email gives off a false sense of ______”.
- 18. When calls are made by social engineering, they are called _____ .
- 20. A crime where a computer is the object of the crime or is used as a tool to commit an offense.
- 21. Where do UTC employee report their ICT issues (three words).
- 23. Always _______your computer when you leave your desk.
- 25. Facebook and TikTok are types of ________ (two words).
- 26. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- 27. A major business disruption; the earth moves, shifts and shakes.
- 29. Who can be the target of a cyber attack.
- 30. Never use your TTUTC________address for personal usage.
- 32. Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc; or you could eat it.
- 34. A fraudulent email purportedly from a reputable company attempting to get personal information.
- 35. You can call 999, 881 or 990 for _______ services.
- 40. The designated area at which employees, visitors and contractors assemble if evacuated from their building/site; The promenade for example (two words).
- 41. This horse can stampede our security defenses for the bad guys and make us look sheepish too!! (two words).
- 42. The address of a webpage. Check the validity of it before clicking on it (acronym).
- 43. __________ setting helps control things like your Profile, Contacts, and other information relating to your account.
- 45. a malicious party impersonates another device or a user in a network to launch attacks against network hosts, steal data, spread malware, or even bypass access controls.
- 47. BCP's main focus is not preventing incidents but rather the __________ from it.
Down
- 1. The process of adding allowed programs to a list is called_________.
- 2. sometimes you ask me to use my eye or voice or finger to identify or to grant access to systems, devices or data.
- 3. __________ Edwards is the Recovery Director and is in charge of BCP.
- 5. An asset like other essential business assets in the Corporation.
- 7. My nickname is Garbage Pail Kid .I am always _________ searching through trash to retrieve sensitive information (two words).
- 9. The staff and the customers are considered.
- 13. A technology that allows us to access our files through the internet from anywhere in the world.
- 16. A list of entities that are blocked or denied privileges or access.
- 17. The art of manipulating people to get access to sensitive information (two words.
- 19. Choose a password that is easy for you to ____________ but hard for you someone to guess.
- 22. information such as legal documents and contracts must be classified as __________information. - (restricted)
- 24. A collection of computers that are controlled on the same network.
- 28. A concept where all things are connected to the internet; household items usually (three words).
- 31. A piece of code put in to correct an error.
- 33. The global system of interconnected computer networks that link billions of devices.
- 34. Choose the strongest password is password345 , Passw0rd123, P@$sW0rD32!, Pa$$worD562.
- 36. Communication test done by teams to ensure that each person can be reached in the event of an emergency (two words).
- 37. The Corporation has a _________policy which states all workspaces must be cleared of sensitive documents if unattended (two words).
- 38. someone who seeks and exploits weaknesses in a computer system or computer network.
- 39. The UTC hotsite is located here.
- 44. Usually comprises the display device of the computer.
- 46. Non-ICT Security Incidents such as unauthorized data usage and disclosure must be reported to the ______________ Department (acronym).