Across
- 3. Your ________ device often contains more personal information than any other source.
- 7. BCP's main focus is not preventing incidents but rather the __________ from it.
- 11. A major business disruption; the earth moves, shifts and shakes.
- 13. Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc; or you could eat it.
- 14. The Corporation has a _________policy which states all workspaces must be cleared of sensitive documents if unattended (two words).
- 16. _______ Authentication requires more than just a password; usually also needs a token or a generated access code or token (two words).
- 19. sometimes you ask me to use my eye or voice or finger to identify or to grant access to systems, devices or data.
- 20. __________ setting helps control things like your Profile, Contacts, and other information relating to your account.
- 22. Never use your TTUTC________address for personal usage.
- 27. Sending an email, posting photos on a social media site and using your webcam.
- 29. The global system of interconnected computer networks that link billions of devices.
- 31. a malicious party impersonates another device or a user in a network to launch attacks against network hosts, steal data, spread malware, or even bypass access controls.
- 33. This “yummy” treat is generated by a web server and saved to your computer after visiting a website; you can also say no, I’m on a diet.
- 39. The art of manipulating people to get access to sensitive information (two words.
- 40. conforming to a rule, such as a specification, policy, standard or law.
- 41. A collection of computers that are controlled on the same network.
- 43. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- 44. The staff and the customers are considered.
- 45. The UTC hotsite is located here.
- 46. This horse can stampede our security defenses for the bad guys and make us look sheepish too!! (two words).
- 47. Facebook and TikTok are types of ________ (two words).
Down
- 1. A crime where a computer is the object of the crime or is used as a tool to commit an offense.
- 2. someone who seeks and exploits weaknesses in a computer system or computer network.
- 4. Communication test done by teams to ensure that each person can be reached in the event of an emergency (two words).
- 5. A technology that allows us to access our files through the internet from anywhere in the world.
- 6. When calls are made by social engineering, they are called _____ .
- 8. Choose a password that is easy for you to ____________ but hard for you someone to guess.
- 9. information such as legal documents and contracts must be classified as __________information. - (restricted)
- 10. A piece of code put in to correct an error.
- 12. Non-ICT Security Incidents such as unauthorized data usage and disclosure must be reported to the ______________ Department (acronym).
- 15. Always _______your computer when you leave your desk.
- 17. Where do UTC employee report their ICT issues (three words).
- 18. My nickname is Garbage Pail Kid .I am always _________ searching through trash to retrieve sensitive information (two words).
- 21. The address of a webpage. Check the validity of it before clicking on it (acronym).
- 23. Usually comprises the display device of the computer.
- 24. An asset like other essential business assets in the Corporation.
- 25. Who can be the target of a cyber attack.
- 26. A concept where all things are connected to the internet; household items usually (three words).
- 27. Equipment that offers short term protection against power surges and power outages (acronym).
- 28. __________ Edwards is the Recovery Director and is in charge of BCP.
- 30. A fraudulent email purportedly from a reputable company attempting to get personal information.
- 32. Choose the strongest password is password345 , Passw0rd123, P@$sW0rD32!, Pa$$worD562.
- 34. The process of adding allowed programs to a list is called_________.
- 35. You can call 999, 881 or 990 for _______ services.
- 36. “ This too good to be true email gives off a false sense of ______”.
- 37. Harmful computer programs such as viruses, worms, and trojans are used by hackers to gain access to your computer and cause destruction.
- 38. A list of entities that are blocked or denied privileges or access.
- 42. The designated area at which employees, visitors and contractors assemble if evacuated from their building/site; The promenade for example (two words).
