Across
- 3. The process or techniques used to analyse large sets of existing information to discover previously unrevealed patterns or correlations. (2)
- 6. It is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
- 7. A record showing who has accessed an IT system and what operations the user has performed during a given period. It is a chronological record that reconstructs and examines the sequence of activities surrounding or leading to a specific operation, procedure, or event in a security relevant transaction from inception.(2)
- 9. A field concerned with designing and developing artificial intelligence algorithms for automated knowledge discovery and innovation by information systems. (2)
- 10. A measurable, physical characteristic or personal behavioral trait by a human being that is used to recognize the identity, or verify the claimed identity, for authentication purposes. Example: Facial images
- 11. E-mail that is not requested. Also known as “unsolicited commercial e-mail” (UCE), “unsolicited bulk e-mail” (UBE), “gray mail” and just plain “junk mail”.
- 12. A _______ is a network security system designed to prevent unauthorized access to or from a private network. It is a gateway that limits access between networks in accordance with local security policy.
Down
- 1. Tricking individuals into disclosing sensitive personal information through deceptive computer-based means, such as through specially crafted emails. It is the use of e-mails that appear to originate from a trusted source to trick a user into entering valid credentials at a fake website.
- 2. These are messages that web servers pass to your web browser when you visit internet sites. Your browser stores each message in a small file and when you request another page from the server, your browser sends the cookie back to the server.
- 3. A __________ is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. The digital equivalent of a handwritten signature or stamped seal, a digital signature offers far more inherent security, and it is intended to solve the problem of tampering and impersonation in digital communications. (2)
- 4. A model for enabling on-demand network access to a shared pool of configurable IT capabilities/ resources (e.g., networks, servers, storage) that can be rapidly provisioned and released with minimal management effort or service provider interaction. (2)
- 5. It a software that disrupts normal computer functions or sends a user’s personal data without the user’s authorization.
- 8. They are programs that claim to perform one function but do another, typically malicious. They can take the form of attachments, downloads, and fake videos/programs.
