Cybersecurity Awareness Month - 2024

123456789101112131415
Across
  1. 2. - When somebody sends an e-mail with a link to a bogus website it is called
  2. 4. - Destroying the cause of security incident with powerful process or technique is which stage of incident response
  3. 8. - Protecting the data against unauthorized access or disclosure is
  4. 9. - Its a type of malware that disguises itself as legitimate code.
  5. 12. Control - Data security process that enables organizations to manage who is authorized to use/process/store data and resources.
  6. 13. - This can slow down your computer AND watch everywhere you go on the internet
  7. 14. - Data that is used to Identify specific individual
  8. 15. - Impact of Threat exploiting a vulnerability is known as
Down
  1. 1. - The control that you have over your personal information and how that information is used
  2. 3. - A globally accepted and recognized standard for cyber security is
  3. 5. - Three principles of ISMS are Confidentiality, ____ and Availability
  4. 6. - Critical security component that determines what resources a user can access and what actions they can perform
  5. 7. - An event that impacts the organization and requires a response and recovery.
  6. 10. -PII Bank information falls under which category of data classification.
  7. 11. - Unique sets of characters used to authenticate user identity and protect personal data or system access.