Infosec

123456789101112131415
Across
  1. 2. ____________allows continuity of business in terms of data availability in case of disaster
  2. 5. In QualityKiosk, Emails should be used for _____ use only
  3. 8. In QualityKiosk, password must be _____ characters
  4. 9. What refers to the protection of information from unauthorized modification or destruction
  5. 10. What A is CIA Triad
  6. 13. _____ is the most common delivery method for viruses
  7. 14. As per password policy, password should be changed within ______ days
  8. 15. An _______ can be the result of unusual circumstances as well as the violation of existing policies and procedures of QualityKiosk
Down
  1. 1. What consists of code developed by cyber attackers, designed to cause extensive damage to data and systems, or to gain unauthorized access to a network
  2. 3. Social engineering is trick used by an attacker to access ______ information
  3. 4. _______ is one of the social engineering attacks that targets victims computer
  4. 6. ______ helps protect your computer against malware and viruses
  5. 7. What is the highest level of information classification defined at QK?
  6. 11. The first step in security awareness is being able to ______ a security threat
  7. 12. Poor security can place information at ___