CISO Crossword Puzzle 0523

1234567891011
Across
  1. 5. The right to control how your information is viewed and used, while being protected against threats or danger.
  2. 6. A type of malicious software that locks the computer screen or files, thus preventing or limiting a user from accessing their system and data until money is paid.
  3. 7. A technique by which cyber criminals steal potentially sensitive user information by injecting malicious JavaScript code in various forms/pages of targeted website.
  4. 9. A software program designed to take advantage of a flaw in a computer system, typically for malicious purposes
  5. 10. A Security incident in which a malicious threat actor gains access to systems without authorization.
  6. 11. Property of data which gives assurance that the data can only be accessed/modified by authorized users.
Down
  1. 1. Software code used as a quick-repair job for a computer program designed to resolve functionality issues, improve security or add new features.
  2. 2. The destruction of the data on a data storage device by removing its magnetism.
  3. 3. A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
  4. 4. A social engineering technique through which a cybercriminal disguises themselves as a known or trusted source.
  5. 5. Format of a message or data in readable form; extremely vulnerable from a confidentiality perspective.
  6. 8. A documented, lowest level of security configuration allowed by an organization.