Across
- 4. A common type of memorized secret, characterized by a string of characters used to verify the identity of a user during the authentication process.
- 5. Ensuring that authorized users have access to information and associated assets when required.
- 7. These fix general software problems and provide new security patches where criminals might get in.
- 9. A type of ATM scam wherein a thin device is inserted in ATM or POS terminal to capture and harvest data from EMV-chip enabled cards.
- 10. Sentence-like format of password which is strong but easier to remember.
- 12. A weakness in your security policy, implementation, design, and controls.
- 13. Your password is considered ____ if it is a combination of upper and lowercase letters, numbers, punctuation, and special symbols.
- 14. You should not write down your password in this type of physical medium.
Down
- 1. A common social engineering attack which usually channeled via email message, whereby someone pretends to be from a legitimate entity to lure you to provide personal or financial data.
- 2. Refers to the technologies, processes, and practices designed to protect information assets and consumers by preventing, detecting and responding to cyber-attacks.
- 3. Ensuring that information is accessible only to those authorized to have access.
- 6. An event that will cause harm to you or your asset.
- 8. A possibility that a threat exploits vulnerability in an information asset, leading to an adverse impact on the organization.
- 9. ”________ is everyone’s responsibility”.
- 11. Safeguarding the accuracy and completeness of information.