information security

12345678910111213141516171819202122232425262728
Across
  1. 3. A form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels
  2. 5. An unimplemented method or algorithm that is able to take advantage of a vulnerability in a computer system
  3. 6. A humorous or malicious deception
  4. 7. Something designed to make readers want to click on a hyperlink especially when the link leads to content of dubious value or interest
  5. 12. Malicious software that observes user's information (passwords, etc.) and actions and then sends that information to a cybercriminal
  6. 14. Intentionally or unintentionally acquiring and using someone else’s ideas and opinions and presenting them as if one’s own without making a reference to or citing the source
  7. 16. An attack on a Bluetooth enabled device (usually a mobile phone) in which an attacker sends an unauthorized message to the device
  8. 17. The person that a software program or hardware device is designed for.
  9. 19. Measure of potential consequences if the computer system or the confidentiality of information was compromised as the result of a security breach
  10. 21. Property of being accessible and usable on demand by an authorized entity
  11. 22. Property that information is not made available or disclosed to unauthorized individuals, entities, or processes
  12. 24. Potential cause of an unwanted incident, which can result in harm to a system or organization
  13. 25. The suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable, or a threat to security
  14. 28. An autonomous and malicious software program propagating among computer networks
Down
  1. 1. Anything that has value to the organization, its business operations and their continuity, including Information resources that support the organization's mission
  2. 2. Property of accuracy and completeness
  3. 4. the ability to control information about oneself
  4. 8. The act of using the Internet, cell phones, video games, or other technology gadgets to send, text, or post images intended to hurt or embarrass another person.
  5. 9. A weakness in some aspect of a computer system that can be used to compromise a system during an attack
  6. 10. All malicious software, including viruses, Trojan horses, and worms
  7. 11. A person who targets computer systems or websites with the motivation of making ideological, political, or religious statements
  8. 13. The fear of being without a mobile device, or beyond mobile phone contact
  9. 15. Measure of the criticality of a situation--the likelihood of something being attacked
  10. 18. A specific type of over-sharing, which represents the habitual use of social media to share news, images, etc. of one’s children
  11. 20. A software that detects and cleans comp
  12. 23. A person gaining unauthorized access to computer networks, systems, or data who breaks into computer systems
  13. 26. Listening in to information that is transmitted over the air including verbal conversations with an objective of learning private information
  14. 27. A string of characters that allows access to a computer, interface, or system.