Across
- 4. Voice-based phishing in which the hacker calls the user impersonating someone else
- 7. Use of SMS messages as the means of reach- ing victims.
- 8. Phishing attack targeting individuals with a high net worth or with high status also called whaling.
- 11. Process of providing a new employee with all information he or she needs on the company, business processes, security policies, and other related material.
- 13. Device with bars or other obstruction to alternately block an entryway and allow only one per- son to pass at a time.
- 15. Physical access control system that uses two sets of interlocking doors the fi rst set of doors must close before the second set can be opened
- 16. ee-shaped wall usually made of concrete to prevent vehicles from passing can be moved into and out of place with heavy equipment. (
- 17. Phishing attack targeting specifi c indi- viduals who may not be wealthy or prominent.
- 18. An entry is embedded in the victim’s local DNS cache that redirects a legitimate URL to an incorrect IP address.
- 21. Document created by the owner of the network containing information on proper usage of the network and related asset
- 22. Any data that can be used to pinpoint a specific person
- 23. Process of closing an employee’s accounts and records when he or she leaves the company
- 25. Electromagnetic signals given off by all electronic equipment
- 26. Vertical cylinder permanently installed to pre- vent vehicles from passing may be retractable to either allow or deny passage
- 27. Technique in which server racks are placed in rows with cold air entering the room on one side and hot air exiting the room on the other side
Down
- 1. Attempting to obtain personal information through fake e-mails that appear to be real
- 2. Barrier placed around wires to block electromagnetic interference from affecting the electri- cal signals in the wires
- 3. System in which video cameras transmit signals to a centralized moni- toring location, but the signals are not publically broad- cast also known as video surveillance
- 5. Secured room in which servers and net- working equipment are installed.
- 6. Involves setting up a website that looks legitimate and credible, but is used to steal personal information entered by users
- 9. Responsibilities are divided so no single individual has complete control over a process or task
- 10. Facility specifi cally designed to store and manage vast quantities of data considerably larger than a server room.
- 12. Specifi cation developed by the National Security Agency (NSA) that deals with methods for spying using electromagnetic radiation and methods to prevent such activities.
- 14. DNS solution that cre- ates a special DNS record to verify the validity of an e-mail sende
- 19. Attack in which hackers embed mali- cious code in websites often visited by specifi c individ- uals, departments, or all employees of a company
- 20. An unauthorized person walking into a facility with or right behind authorized people to appear as if with them
- 24. The type of fire based on the fuel that feeds the fire.