Learning Unit 2 Puzzle
Across
- 3. act as a barrier between a trusted internal network and untrusted external networks, helping to prevent unauthorized access.
- 4. Deceptive emails that attempt to trick individuals into revealing sensitive information, such as passwords or financial details.
- 5. Risks associated with employees, contractors, or other insiders intentionally or unintentionally causing harm to the organization, such as data theft or sabotage.
- 6. involves identifying, assessing, prioritizing, and mitigating these risks to ensure the resilience and security of IT systems within an organization.
- 10. The risk of losing critical data due to hardware failures, software errors, or accidental deletion.
- 11. including malware, ransomware, phishing, and other malicious activities that can compromise the confidentiality, integrity, and availability of data.
- 12. Utilizing a network of compromised computers (bots) to perform coordinated actions, such as launching attacks, spreading malware, or conducting fraud.
Down
- 1. Risks associated with the impact of natural disasters (e.g., earthquakes, floods, fires) on IT infrastructure and data centers.
- 2. Criminals may use cryptocurrencies for ransom payments, money laundering, or conducting illegal transactions due to the relative anonymity they provide.
- 7. Individuals with authorized access, such as employees or contractors, may misuse their privileges for unauthorized activities, data theft, or sabotage.
- 8. Encrypts a user's data and demands payment for its release, often delivered through malicious email attachments or compromised websites.
- 9. Manipulating individuals through psychological tactics to gain unauthorized access or sensitive information.