Review - Up to Week 4

123456789101112131415161718
Across
  1. 1. Threats that can include amateurs or skilled attackers outside of the organization can cause a threat.
  2. 4. A software or hardware device that monitors incoming and outgoing network traffic, applying rules to allow or disallow certain types of traffic.
  3. 8. (5,9) Using software and/or hardware resources that are operated by a third party remotely.
  4. 10. (12,6) is the loss to financial capital social capital and/or market share resulting from damage to an organization's reputation.
  5. 11. a piece of code which, when certain conditions are met, will carry out an action which will be detrimental to the system, e.g. wiping data.
  6. 12. Threats that can include employees, contract staff, or trusted partners that can accidentally or intentionally cause a threat.
  7. 15. is a set of rules that prevents sensitive information from being disclosed to unauthorized people, resources, and processes.
  8. 17. (8,8)Locks and keypads for preventing access to computer rooms or storage facilities or to prevent access to storgare areas
  9. 18. A person who attempts to gain unauthorised access to a system.
Down
  1. 2. the design of this malware is to hold a computer system or the data it contains captive until it makes a payment, usually encrypts your information so you can't access it.
  2. 3. a Cyber Criminal may take control of an organization’s website posting untrue information, is one type of this activity.
  3. 5. ensures that system information or processes are protected from intentional or accidental modification.
  4. 6. (12,8) attackers get their hands on organisations confidential documents, trade secrets, designs etc.
  5. 7. An administrative division of a client/server network.
  6. 9. misleading individuals or organisations into parting with their confidential and personal data to commit fraud.
  7. 13. a type of data breach where the goal is to take sensitive personal data.
  8. 14. means that authorized users are able to access systems and data when and where needed and those that do not meet established conditions, are not.
  9. 16. is a large network of physical objects, such as sensors, software, and other equipment.