Talk To Me in Cybersecurity

1234567891011121314151617
Across
  1. 1. Three aspects of management that, when well-coordinated, ensure a company and its people behave ethically, run the business effectively, mitigate risks appropriately and comply with internal policies and external regulations
  2. 3. A formal and approved list of users who have defined access rights to an asset
  3. 5. Attempts to disrupt normal traffic of a targeted server, service or network to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources
  4. 6. Software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted
  5. 9. A technology and business process designed to detect and prevent violations to corporate policies regarding the use, storage, and transmission of sensitive data
  6. 10. Surveillance software that can record every keystroke made on a computer’s keyboard
  7. 13. The practice of testing a computer system or network to find vulnerabilities that cybercriminals could exploit
  8. 14. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
  9. 15. Represents a rapidly growing class of non-traditional computing devices that are connected to the internet to drive some sort of intelligent operation
  10. 16. The psychological manipulation of people into performing actions or divulging confidential information
  11. 17. Computer program used to prevent, detect, and remove malware
Down
  1. 2. The U.S. federal agency responsible for developing and maintaining the “Framework for Improving Critical Infrastructure Cybersecurity,” a collection of voluntary guidelines to help organizations manage their information security risks
  2. 4. Software used to monitor, log, provide alerts and analyze security events to support threat detection and incident response
  3. 7. Refers to a company security policy that allows for employees’ personal devices to be used in business
  4. 8. Devices or software designed to find and prevent malicious activity on corporate networks
  5. 11. Actions a company takes to manage the aftermath of a security breach or cyberattack
  6. 12. A type of authentication method where the proof of a user’s identity is gained by different independent sources