Across
- 2. Phishing in which the victims receive a voice-mail message telling them to call a phone number or access a website
- 3. A harmful program that resides in the active memory of the computer and duplicates itself
- 6. The deployment of malware that steals data from government agencies, military contractors, political organizations, or manufacturing firms
- 12. What organization is mentioned as a resource for cybersecurity guidance?
- 14. An attack on an information system that takes advantage of a particular system vulnerability
- 15. Software that generates and grades tests that humans can pass but computer programs cannot
- 17. The process of scrambling messages or data in such a way that only authorized parties can read it
- 19. What federal agency is responsible for protecting U.S. cyber infrastructure?
- 21. Defines an organization’s security requirements, as well as the controls and sanctions needed to meet those requirements.
- 22. Perpetrators: Launches computer-based attacks against other computers or networks in an attempt to intimidate or coerce an organization in order to advance certain political or social objectives.
- 25. The process of assessing security-related risks to an organization’s computers and networks from both internal and external threats.
- 26. A set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge
- 27. An attack that occurs before the security community is aware of a vulnerability
- 28. Perpetrators: Someone who violates computer or Internet security maliciously or for illegal personal gain
- 29. Federal Laws: Addresses fraud and related activities in association with computers
Down
- 1. Software and/or hardware that monitors system resources and activities and issues an alert when it detects network traffic attempting to circumvent security measures
- 2. A specific sequence of bytes that indicates the presence of a previously identified virus
- 4. What type of phishing specifically targets an organization's employees?
- 5. Malware that encrypts data and demands a ransom
- 7. What does BYOD mean?
- 8. A system of software and/or hardware that stands guard between an organization’s internal network and the Internet
- 9. What type of attack floods a target with data requests to make a site unavailable?
- 10. Many organizations use this to monitor, manage, and maintain their computer and network security
- 11. Enables remote users to securely access an organization’s computing resources and share data by transmitting and receiving encrypted data over public networks, such as the Internet
- 13. Perpetrators: An individual whose goal is to promote a political ideology
- 16. Confidentiality, Integrity, Availability
- 18. Federal Laws: Defines cyberterrorism and associated penalties
- 20. Phishing using SMS
- 23. A networking device that connects multiple networks and transmits data packets between networks
- 24. What type of malware disguises itself as legitimate software?