CISO Crossword Quiz - 1525

12345678
Across
  1. 2. An attack where multiple systems are used to flood a target with traffic, causing it to become unavailable
  2. 3. A copy of the information held on a device (such as photos and documents) which is stored somewhere else
  3. 5. A mechanism for creating a secure connection between a computing device & a computer network
  4. 7. A ____ breach is when a hacker successfully breaks into a system and exposes private information
  5. 8. The front line of defense in information security needed for accessing resources in a computer system
Down
  1. 1. If you receive a suspicious ____, hover over it with your mouse before clicking to make sure it is real
  2. 2. Which act outlines the consent, purpose limitation & accountability in the processing of digital personal data
  3. 4. A location on the internet where you can save your data securely(rather than on your computer or device)
  4. 6. A replacement for passwords that provides more secure sign-ins to websites and apps across a user's device
  5. 8. A message that tries to trick you into doing something that could cause you harm, such as giving away information or clicking a link