CIS 27 Chapter 2

12345678910111213141516171819202122232425262728293031
Across
  1. 3. SMS-based phishing attack via fraudulent messages.
  2. 5. Advanced Google search techniques for information.
  3. 9. Sturdy post blocking vehicles for security
  4. 14. A device that detects and measures physical properties.
  5. 15. The total exposure points to social engineering.
  6. 17. Exploiting misspelled URLs for malicious purposes.
  7. 18. Fraud exploiting email for financial theft
  8. 20. Manipulating users to disclose confidential information.
  9. 21. Pretending to be someone real or fictitious.
  10. 24. Replacing sensitive data with random tokenized values.
  11. 26. Gaining private information through fabricated scenarios.
  12. 27. Infecting frequented websites with malware
  13. 29. Removing sensitive data to ensure privacy.
  14. 30. Voice phishing using phone calls to scam victims.
  15. 31. Country-specific laws governing data usage.
Down
  1. 1. Restricting access to protect networks
  2. 2. Detects motion using microwave signal reflection
  3. 4. A creative invention or work with rights.
  4. 6. – Locating and identifying where data resides.
  5. 7. Determining device's physical location using coordinates
  6. 8. Creating a modified copy of original data.
  7. 10. Identification card granting secure area access
  8. 11. A targeted attack on specific individuals or groups.
  9. 12. False or misleading information with malicious intent.
  10. 13. Exploiting electronic payments for financial gain.
  11. 16. The highest level of data sensitivity
  12. 19. Converting data into unreadable form for security.
  13. 22. Illuminates areas to prevent unauthorized access
  14. 23. Confidential information providing business competitive advantage
  15. 25. Redirecting users to fake websites to steal data.
  16. 28. The highest classification level of sensitive data.