Principles of Cybersecurity Chapter 5 Vocabulary

123456789101112131415161718192021222324252627
Across
  1. 4. Voice-based phishing in which the hacker calls the user impersonating someone else
  2. 7. Use of SMS messages as the means of reach- ing victims.
  3. 8. Phishing attack targeting individuals with a high net worth or with high status also called whaling.
  4. 11. Process of providing a new employee with all information he or she needs on the company, business processes, security policies, and other related material.
  5. 13. Device with bars or other obstruction to alternately block an entryway and allow only one per- son to pass at a time.
  6. 15. Physical access control system that uses two sets of interlocking doors the fi rst set of doors must close before the second set can be opened
  7. 16. ee-shaped wall usually made of concrete to prevent vehicles from passing can be moved into and out of place with heavy equipment. (
  8. 17. Phishing attack targeting specifi c indi- viduals who may not be wealthy or prominent.
  9. 18. An entry is embedded in the victim’s local DNS cache that redirects a legitimate URL to an incorrect IP address.
  10. 21. Document created by the owner of the network containing information on proper usage of the network and related asset
  11. 22. Any data that can be used to pinpoint a specific person
  12. 23. Process of closing an employee’s accounts and records when he or she leaves the company
  13. 25. Electromagnetic signals given off by all electronic equipment
  14. 26. Vertical cylinder permanently installed to pre- vent vehicles from passing may be retractable to either allow or deny passage
  15. 27. Technique in which server racks are placed in rows with cold air entering the room on one side and hot air exiting the room on the other side
Down
  1. 1. Attempting to obtain personal information through fake e-mails that appear to be real
  2. 2. Barrier placed around wires to block electromagnetic interference from affecting the electri- cal signals in the wires
  3. 3. System in which video cameras transmit signals to a centralized moni- toring location, but the signals are not publically broad- cast also known as video surveillance
  4. 5. Secured room in which servers and net- working equipment are installed.
  5. 6. Involves setting up a website that looks legitimate and credible, but is used to steal personal information entered by users
  6. 9. Responsibilities are divided so no single individual has complete control over a process or task
  7. 10. Facility specifi cally designed to store and manage vast quantities of data considerably larger than a server room.
  8. 12. Specifi cation developed by the National Security Agency (NSA) that deals with methods for spying using electromagnetic radiation and methods to prevent such activities.
  9. 14. DNS solution that cre- ates a special DNS record to verify the validity of an e-mail sende
  10. 19. Attack in which hackers embed mali- cious code in websites often visited by specifi c individ- uals, departments, or all employees of a company
  11. 20. An unauthorized person walking into a facility with or right behind authorized people to appear as if with them
  12. 24. The type of fire based on the fuel that feeds the fire.