IT Vocabulary

12345678910
Across
  1. 1. a type of social engineering attack often used to steal user data including login credentials and credit card numbers
  2. 5. device that uses integrated circuit assemblies to store data persistently, typically using flash memory
  3. 6. responsible for an organization’s overarching cybersecurity, which can include prevention, incident response (IR), compliance, and risk management.
  4. 8. use a computer to gain unauthorized access to data in a system
  5. 10. a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker
Down
  1. 2. one kind of technology that stores the operating system, applications, and data files
  2. 3. also referred to as junk email
  3. 4. a set of computers sharing resources located together.
  4. 7. attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic utilizing multiple compromised systems
  5. 9. a group of information security experts responsible for the protection against, detection of and response to an organization's cybersecurity incidents.