Across
- 1. Security implementation involves four complementary courses of action: prevention, detection, response, and _.
- 4. Don’t use the same _ on different sites and change it regularly.
- 6. Cyber _ includes single actors or groups targeting systems for financial gain or to cause disruption.
- 7. _ is used to protect the application by filtering and monitoring incoming and outgoing traffic between web application and the internet.
- 10. _ security protects the integrity and privacy of data, both in storage and in transit.
- 12. A loss of _ is the disruption of access to or use of information or an information system.
- 13. _ is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- 14. A _ is set on the boundaries of any system or network which monitors and controls network traffic.
Down
- 2. _ security refers to the protection of hardware, software, and data from attackers.
- 3. _ security includes the processes and decisions for handling and protecting data assets.
- 5. The assets of a computer system can be categorized as hardware, software, communication lines and networks, and _.
- 8. Data leakage is an unauthorized transfer of _ to the outside world.
- 9. Avoid using unsecure _ networks in public places
- 11. A(n) _ is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat consequence.
- 13. _ is a malware that aims to steal data about the organization or person.