Information System Security and Control

1234567891011121314151617181920
Across
  1. 3. Connecting a listening device to the circuit carrying information between phones
  2. 5. Actions traced to an individual to ensure that the person who makes data or system changes can be identified
  3. 6. These individuals constitute the majority of the threat community
  4. 7. Send the same message indiscriminately
  5. 9. Verifying the identity
  6. 13. Recognizing the consequences of risks in a deliberate and systematic way
  7. 15. Multiple systems flood the bandwidth
  8. 17. Smart cards and memory cards
  9. 18. Does the damage after it is implanted in some way into a target's computer
  10. 19. Without time
  11. 20. Natural phenomenon
Down
  1. 1. Exploit vulnerabilities and creates risk
  2. 2. Motivated to use their skills for political purposes
  3. 4. Weaknesses exploited, threat independent
  4. 8. Fingerprints, iris granularity, retina blood vessels, facial features, and hand geometry
  5. 10. Process of protecting a resource
  6. 11. Programs that search for and execute themselves in available host CPU processing memory
  7. 12. Honesty and truthfulness
  8. 14. Protective measures to reduce risks
  9. 16. Bring Your On Device