Data Protection

123456789101112131415161718192021222324
Across
  1. 2. To gather compromised information and/or defense secrets
  2. 8. Individuals who want to attack computers yet lack the knowledge
  3. 10. Following a victim with authorized credentials through a door or other secure building access point
  4. 11. Data at rest
  5. 12. Visually capturing logins or passwords or other sensitive information over someone's ______ while using a computer.
  6. 13. Designed to hold a computer system or the data it contains captive until a payment
  7. 17. A security breach can have a negative long-term impact on an organization’s _________
  8. 18. More targeted version of the phishing
  9. 20. Employees, contract staff or trusted partners
  10. 22. Telling a computer to perform some task using CLI
  11. 24. Cyberwarfare can destabilize a nation
Down
  1. 1. an attacker establishes trust with their victim by impersonating persons who have right-to-know authority
  2. 2. Preventing unwanted changes or alteration
  3. 3. Network, Devices, Power Grid, Roads
  4. 4. Data traveling between information systems
  5. 5. A broad range of malicious activities accomplished through psychological manipulation of people into performing actions or divulging confidential information.
  6. 6. Core Principles of Cybersecurity
  7. 7. Get victims to click on links to malicious websites, open attachments that contain malware or reveal sensitive information.
  8. 9. Using technology to penetrate and attack another nation’s computer systems and networks in an effort to cause damage or disrupt services
  9. 14. Amateurs or skilled attackers outside of the organization
  10. 15. Data developed around the user without their express input, usually generated based on search histories, content consumption, purchases, and social media activity
  11. 16. Breaks into networks or computer systems to identify and improve any weaknesses
  12. 19. Technique used on unshredded documents
  13. 21. Make political statements in order to raise awareness about issues
  14. 23. Using a false promise to gain a victim’s interest to lure them into a trap that steals their personal information or infects their systems