MMolloy_CIS-Word.pptx

12345678910111213141516171819
Across
  1. 1. intentionally taking over the administrative position
  2. 5. An observable occurrence in an information system or network.
  3. 10. A program used for, and writing html and css documents
  4. 12. Malicious program data which can damage software
  5. 14. An unusual message from an unknown source, with malicious intent behind it.
  6. 15. A kind of.. "Warden" that protects personal information, frequently found in websites with personal information.
  7. 16. Unauthorized program code dedicated to carrying out a malicious commands, changes, etc.
  8. 17. A value computed with a cryptographic process using a private key and then appended to a data object
  9. 18. The activities that refer to the short and long term development of a cyber-incident
  10. 19. The manner/method someone uses to infiltrate a secure system
Down
  1. 2. refers to anything that could seriously affect a given system, infrastructure, or data center
  2. 3. An ethical hacking method used to gather unfamiliar system data
  3. 4. The result of unintentionally or accidentally deleting data
  4. 6. a method used to infiltrate unauthorized systems in violation of security policy
  5. 7. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information
  6. 8. A chain of text used to make calculations in Excel
  7. 9. contains information, text, and can be used to write specific mathematical equasions
  8. 11. A type of cyber-attack that is automized for this specific type of e-attack
  9. 13. Things like firewalls, services, password prompts, etc.