ICS- Review 1

12345678910111213141516171819
Across
  1. 4. a criminal tactic using scam emails, texts, or calls to trick people into clicking malicious links, downloading malware, revealing sensitive information like passwords or financial details, or transferring money
  2. 6. the design of this malware is to hold a computer system or the data it contains captive until it makes a payment, usually encrypts your information so you can't access it.
  3. 8. You should also use this encrypted service to prevent others from intercepting your information over a public wireless network.
  4. 9. will log the detection and create an alert for a network administrator. It will not take action.
  5. 10. can block or deny traffic based on a positive rule or signature match.
  6. 11. (4,2,3) when a user is accessing data.
  7. 14. (4,2,6) when data is traveling through the network.
  8. 16. (12,8) attackers get their hands on organisations confidential documents, trade secrets, designs etc.
  9. 18. (4,10) is the formal process of continuously identifying and assessing risk to reduce the impact of threats and vulnerabilities.
  10. 19. (9,8) where you could backup or copy all your data to i.e. a NAS, or an external hard drive
Down
  1. 1. (6-2-7) attacks are a type of network attack that is relatively simple to carry out, even by an unskilled attacker. A DoS attack results in some interruption of network service to users, devices, or applications.
  2. 2. (12,6) is the loss to financial capital social capital and/or market share resulting from damage to an organization's reputation.
  3. 3. is a computer program that, when executed, replicates and attaches itself to other executable files, such as a document, by inserting its code. Usually require end-user interaction to initiate activation and can act on a specific date or time.
  4. 5. a Cyber Criminal may take control of an organization’s website posting untrue information, is one type of this activity.
  5. 7. (4,2,7) the financial impact of a security breach can
  6. 11. (4,2,4) when data is stored in a computer network or device.
  7. 12. may prevent the loss of irreplaceable data.
  8. 13. (6,11)is manipulating people into performing actions or divulging confidential information.
  9. 15. can have sophisticated security policies applied to the traffic passing through them. Can look deeper into the network traffic to block malicious behaviour.
  10. 17. a type of data breach where the goal is to take sensitive personal data.