Across
- 6. Any device that connects to the corporate network. Types of devices include laptops, phones, servers, switches, printers, etc.
- 7. Any potential danger to information or systems.
- 10. A system for collecting, saving, processing, and presenting data by means of a computer. This term is generally used when referring to a component of software that can be executed.
- 11. Weakness in system security procedures, design, implementation, internal controls, etc., that could be accidentally triggered or intentionally exploited and result in a violation of the system’s security policy.
Down
- 1. An Identity and Access Management technology solution which ensures the security of information assets and continued identity governance and regulatory compliance for applications running on-premise or from the cloud.
- 2. The practice of identifying and protecting assets in cyberspace: detecting, responding to and recovering from cyber risk events.
- 3. The potential loss to an area due to the occurrence of an adverse event.
- 4. Hostile or malicious software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware and other malicious programs. It can be in the form of executable code, scripts, active content and other software.
- 5. The potential that events, expected or unanticipated, may have an adverse effect on a financial institution's earnings, capital, or reputation
- 8. A passwordless, Multi-Factor Authentication (MFA) solution that provides the security of a token with the convenience of a smartphone. With this new solution, you’ll no longer need to memorize a password, allowing you to log in to your computer much faster and more securely.
- 9. The physical components of an information system.
- 12. A record of events occurring within an entity's systems and networks.