Across
- 2. - When somebody sends an e-mail with a link to a bogus website it is called
- 4. - Destroying the cause of security incident with powerful process or technique is which stage of incident response
- 8. - Protecting the data against unauthorized access or disclosure is
- 9. - Its a type of malware that disguises itself as legitimate code.
- 12. Control - Data security process that enables organizations to manage who is authorized to use/process/store data and resources.
- 13. - This can slow down your computer AND watch everywhere you go on the internet
- 14. - Data that is used to Identify specific individual
- 15. - Impact of Threat exploiting a vulnerability is known as
Down
- 1. - The control that you have over your personal information and how that information is used
- 3. - A globally accepted and recognized standard for cyber security is
- 5. - Three principles of ISMS are Confidentiality, ____ and Availability
- 6. - Critical security component that determines what resources a user can access and what actions they can perform
- 7. - An event that impacts the organization and requires a response and recovery.
- 10. -PII Bank information falls under which category of data classification.
- 11. - Unique sets of characters used to authenticate user identity and protect personal data or system access.