IS and BC Cross-Up Crossword

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647
Across
  1. 3. Your ________ device often contains more personal information than any other source.
  2. 7. BCP's main focus is not preventing incidents but rather the __________ from it.
  3. 11. A major business disruption; the earth moves, shifts and shakes.
  4. 13. Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc; or you could eat it.
  5. 14. The Corporation has a _________policy which states all workspaces must be cleared of sensitive documents if unattended (two words).
  6. 16. _______ Authentication requires more than just a password; usually also needs a token or a generated access code or token (two words).
  7. 19. sometimes you ask me to use my eye or voice or finger to identify or to grant access to systems, devices or data.
  8. 20. __________ setting helps control things like your Profile, Contacts, and other information relating to your account.
  9. 22. Never use your TTUTC________address for personal usage.
  10. 27. Sending an email, posting photos on a social media site and using your webcam.
  11. 29. The global system of interconnected computer networks that link billions of devices.
  12. 31. a malicious party impersonates another device or a user in a network to launch attacks against network hosts, steal data, spread malware, or even bypass access controls.
  13. 33. This “yummy” treat is generated by a web server and saved to your computer after visiting a website; you can also say no, I’m on a diet.
  14. 39. The art of manipulating people to get access to sensitive information (two words.
  15. 40. conforming to a rule, such as a specification, policy, standard or law.
  16. 41. A collection of computers that are controlled on the same network.
  17. 43. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  18. 44. The staff and the customers are considered.
  19. 45. The UTC hotsite is located here.
  20. 46. This horse can stampede our security defenses for the bad guys and make us look sheepish too!! (two words).
  21. 47. Facebook and TikTok are types of ________ (two words).
Down
  1. 1. A crime where a computer is the object of the crime or is used as a tool to commit an offense.
  2. 2. someone who seeks and exploits weaknesses in a computer system or computer network.
  3. 4. Communication test done by teams to ensure that each person can be reached in the event of an emergency (two words).
  4. 5. A technology that allows us to access our files through the internet from anywhere in the world.
  5. 6. When calls are made by social engineering, they are called _____ .
  6. 8. Choose a password that is easy for you to ____________ but hard for you someone to guess.
  7. 9. information such as legal documents and contracts must be classified as __________information. - (restricted)
  8. 10. A piece of code put in to correct an error.
  9. 12. Non-ICT Security Incidents such as unauthorized data usage and disclosure must be reported to the ______________ Department (acronym).
  10. 15. Always _______your computer when you leave your desk.
  11. 17. Where do UTC employee report their ICT issues (three words).
  12. 18. My nickname is Garbage Pail Kid .I am always _________ searching through trash to retrieve sensitive information (two words).
  13. 21. The address of a webpage. Check the validity of it before clicking on it (acronym).
  14. 23. Usually comprises the display device of the computer.
  15. 24. An asset like other essential business assets in the Corporation.
  16. 25. Who can be the target of a cyber attack.
  17. 26. A concept where all things are connected to the internet; household items usually (three words).
  18. 27. Equipment that offers short term protection against power surges and power outages (acronym).
  19. 28. __________ Edwards is the Recovery Director and is in charge of BCP.
  20. 30. A fraudulent email purportedly from a reputable company attempting to get personal information.
  21. 32. Choose the strongest password is password345 , Passw0rd123, P@$sW0rD32!, Pa$$worD562.
  22. 34. The process of adding allowed programs to a list is called_________.
  23. 35. You can call 999, 881 or 990 for _______ services.
  24. 36. “ This too good to be true email gives off a false sense of ______”.
  25. 37. Harmful computer programs such as viruses, worms, and trojans are used by hackers to gain access to your computer and cause destruction.
  26. 38. A list of entities that are blocked or denied privileges or access.
  27. 42. The designated area at which employees, visitors and contractors assemble if evacuated from their building/site; The promenade for example (two words).