Kyle McKinney's Chapter 15 Puzzle

123456789101112131415161718
Across
  1. 2. You might use this extinguisher on a grease fire.
  2. 7. ______________ control is in place to stop the spread of damage and prevent loss of data.
  3. 9. Foraging for private information in often unsanitary receptacles.
  4. 10. Protects computers from intermittent data loss.
  5. 12. Diverting a delivery to gain access to goods.
  6. 15. Examples include your DL# and credit card information
  7. 16. The removal of a threat.
  8. 18. A attempt to obtain private information via verification e-mails.
Down
  1. 1. In order to audit an IT manager, a company may ask him to take a __________ vacation.
  2. 3. Watching as someone enters a password or PIN.
  3. 4. An expensive chemical sometimes used in server room extinguishers.
  4. 5. This type of sprinkler system might have heads with glass bulbs.
  5. 6. Leaving a USB drive, infected with malware, in plain site.
  6. 8. Rules to restrict how a computer is used.
  7. 11. ___ rotation involves two or more employees switching roles.
  8. 12. Incineration of storage media.
  9. 13. Transient electromagnetic pulse emanations standard
  10. 14. Soundproofing is a common way to prevent this.
  11. 17. Degaussing a disk or overwriting data with bit-level software.