Across
- 1. a type of social engineering attack often used to steal user data including login credentials and credit card numbers
- 5. device that uses integrated circuit assemblies to store data persistently, typically using flash memory
- 6. responsible for an organization’s overarching cybersecurity, which can include prevention, incident response (IR), compliance, and risk management.
- 8. use a computer to gain unauthorized access to data in a system
- 10. a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker
Down
- 2. one kind of technology that stores the operating system, applications, and data files
- 3. also referred to as junk email
- 4. a set of computers sharing resources located together.
- 7. attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic utilizing multiple compromised systems
- 9. a group of information security experts responsible for the protection against, detection of and response to an organization's cybersecurity incidents.