Across
- 1. Threats that can include amateurs or skilled attackers outside of the organization can cause a threat.
- 4. A software or hardware device that monitors incoming and outgoing network traffic, applying rules to allow or disallow certain types of traffic.
- 8. (5,9) Using software and/or hardware resources that are operated by a third party remotely.
- 10. (12,6) is the loss to financial capital social capital and/or market share resulting from damage to an organization's reputation.
- 11. a piece of code which, when certain conditions are met, will carry out an action which will be detrimental to the system, e.g. wiping data.
- 12. Threats that can include employees, contract staff, or trusted partners that can accidentally or intentionally cause a threat.
- 15. is a set of rules that prevents sensitive information from being disclosed to unauthorized people, resources, and processes.
- 17. (8,8)Locks and keypads for preventing access to computer rooms or storage facilities or to prevent access to storgare areas
- 18. A person who attempts to gain unauthorised access to a system.
Down
- 2. the design of this malware is to hold a computer system or the data it contains captive until it makes a payment, usually encrypts your information so you can't access it.
- 3. a Cyber Criminal may take control of an organization’s website posting untrue information, is one type of this activity.
- 5. ensures that system information or processes are protected from intentional or accidental modification.
- 6. (12,8) attackers get their hands on organisations confidential documents, trade secrets, designs etc.
- 7. An administrative division of a client/server network.
- 9. misleading individuals or organisations into parting with their confidential and personal data to commit fraud.
- 13. a type of data breach where the goal is to take sensitive personal data.
- 14. means that authorized users are able to access systems and data when and where needed and those that do not meet established conditions, are not.
- 16. is a large network of physical objects, such as sensors, software, and other equipment.
