Learning Unit 2 Puzzle

123456789101112
Across
  1. 3. act as a barrier between a trusted internal network and untrusted external networks, helping to prevent unauthorized access.
  2. 4. Deceptive emails that attempt to trick individuals into revealing sensitive information, such as passwords or financial details.
  3. 5. Risks associated with employees, contractors, or other insiders intentionally or unintentionally causing harm to the organization, such as data theft or sabotage.
  4. 6. involves identifying, assessing, prioritizing, and mitigating these risks to ensure the resilience and security of IT systems within an organization.
  5. 10. The risk of losing critical data due to hardware failures, software errors, or accidental deletion.
  6. 11. including malware, ransomware, phishing, and other malicious activities that can compromise the confidentiality, integrity, and availability of data.
  7. 12. Utilizing a network of compromised computers (bots) to perform coordinated actions, such as launching attacks, spreading malware, or conducting fraud.
Down
  1. 1. Risks associated with the impact of natural disasters (e.g., earthquakes, floods, fires) on IT infrastructure and data centers.
  2. 2. Criminals may use cryptocurrencies for ransom payments, money laundering, or conducting illegal transactions due to the relative anonymity they provide.
  3. 7. Individuals with authorized access, such as employees or contractors, may misuse their privileges for unauthorized activities, data theft, or sabotage.
  4. 8. Encrypts a user's data and demands payment for its release, often delivered through malicious email attachments or compromised websites.
  5. 9. Manipulating individuals through psychological tactics to gain unauthorized access or sensitive information.