Across
- 3. Hard to detect both by Users.
- 7. The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment.
- 10. A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software.
- 12. The likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization.
- 13. An attack focusing on people rather than technology.
- 18. A form of malware that monitors user activities and reports them to an external their party.
- 19. Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system.
- 20. Something that shows up in an email.
- 21. Threats Malware is defined as any device.
Down
- 1. A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite.
- 2. A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP.
- 4. The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization.
- 5. A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual.
- 6. a dishonest scheme; a fraud.
- 8. Alerts used as a warning of danger.
- 9. The ultimate call control center that gives customers full control of all scam protection options.
- 11. The act of falsifying the identity of the source of a communication or interaction.
- 12. Identity and Privacy Protection.
- 14. Someone attempting to create Identity fraud.
- 15. A specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats.
- 16. An attempt by hackers to damage or destroy a computer network or system.
- 17. A security tool, which may be a hardware or software solution that is used to filter network traffic.
