Chapter 15 Puzzle

12345678910111213141516171819
Across
  1. 1. Watching as someone enters a password or PIN.
  2. 4. In order to audit an IT manager, a company may ask him to take a __________ vacation.
  3. 6. ___ rotation involves two or more employees switching roles.
  4. 8. Transient electromagnetic pulse emanations standard
  5. 9. Foraging for private information in often unsanitary receptacles.
  6. 15. Rules to restrict how a computer is used.
  7. 16. This type of sprinkler system might have heads with glass bulbs.
  8. 17. A attempt to obtain private information via verification e-mails.
  9. 18. Degaussing a disk or overwriting data with bit-level software.
  10. 19. Incineration of storage media.
Down
  1. 2. An expensive chemical sometimes used in server room extinguishers.
  2. 3. Diverting a delivery to gain access to goods.
  3. 5. Soundproofing is a common way to prevent this.
  4. 7. Protects computers from intermittent data loss.
  5. 10. Examples include your DL# and credit card information
  6. 11. ______________ control is in place to stop the spread of damage and prevent loss of data.
  7. 12. The removal of a threat.
  8. 13. You might use this extinguisher on a grease fire.
  9. 14. Leaving a USB drive, infected with malware, in plain site.