Kyle McKinney's ITSY1400 Chapter 15 Puzzle

12345678910111213141516171819
Across
  1. 4. Rules to restrict how a computer is used.
  2. 8. Foraging for private information in often unsanitary receptacles.
  3. 9. Protects computers from intermittent data loss.
  4. 12. Watching as someone enters a password or PIN.
  5. 15. ______________ control is in place to stop the spread of damage and prevent loss of data.
  6. 16. Transient electromagnetic pulse emanations standard
  7. 17. The removal of a threat.
  8. 18. Examples include your DL# and credit card information
  9. 19. Leaving a USB drive, infected with malware, in plain site.
Down
  1. 1. This type of sprinkler system might have heads with glass bulbs.
  2. 2. Degaussing a disk or overwriting data with bit-level software.
  3. 3. You might use this extinguisher on a grease fire.
  4. 5. A attempt to obtain private information via verification e-mails.
  5. 6. Diverting a delivery to gain access to goods.
  6. 7. In order to audit an IT manager, a company may ask him to take a __________ vacation.
  7. 10. An expensive chemical sometimes used in server room extinguishers.
  8. 11. ___ rotation involves two or more employees switching roles.
  9. 13. Soundproofing is a common way to prevent this.
  10. 14. Incineration of storage media.