Across
- 1. A person who circumvents information security, often with malicious intent
- 4. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
- 5. Malware designed to make data or hardware inaccessible to the victim until a ransom is paid.
- 7. Event that has been determined to have an impact on the organization prompting the need for response and recovery.
- 10. Fake messages from a seemingly trusted or reputable source designed to convince you to take some sort of action
- 11. A made-up scenario developed by threat actors for the purpose of stealing a victim's personal data
- 13. Data or other information which otherwise identifies an individual in a way that is reasonably likely to enable identification of a specific person (hint: abbreviation)
- 14. A set of instructions, data or programs used to operate computers and execute specific tasks
Down
- 2. Any crime which is committed electronically
- 3. Security process that requires more than one method of authentication from independent sources to verify the user’s identity (hint: abbreviation)
- 6. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
- 8. Someone who is deceived or cheated by the dishonesty of others
- 9. The computer's tangible components or delivery systems that store and run the written instructions
- 12. software intended to damage, disable, or give someone unauthorized access to your computer or other internet-connected device.