Across
- 2. set of security controls designed to protect payment account security such as credit or debit card transactions
- 4. protection of digital devices and their connected networks from danger and threats as well as protecting personal information on a system by detecting, preventing and responding to attacks
- 5. crime committed over the internet
- 6. short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer
- 11. set of policies and procedures meant to improve and guide an organization’s cybersecurity practices
- 12. occur when hackers or malicious software gains unauthorized access to a system, examples include: hacker cracking passwords, breaking into a server or changing a user’s privileges on their system
Down
- 1. set of best practice recommendations for information security management
- 3. unique skills for a specific area
- 7. attempt to steal, damage or destroy information on a device or computer system
- 8. individual who participates in hacking
- 9. abilities needed to communicate and work with others
- 10. prevents a user from accessing a system
- 13. act of skirting or breaking through security boundaries
