Across
- 1. Social engineering attacks fool users to give up usernames and __________
- 7. A network ________ is a weakness or flaw in software, hardware, or organizational process, which when compromised by a threat can result in a security breach
- 9. malware disguised as legitimate software
- 10. assurance that someone cannot deny the validity of something
- 14. Attempting to target high-profile business executive or manager with emails and web pages that appear to be official
- 15. designed to lock users out of their system or deny access to data until ransom is paid
- 16. Cyber-attack that uses SMS text messages
- 17. CIA for maintaining consistency, accuracy and trustworthiness of data over its entire lifecycle
Down
- 2. CIA for data readily accessible for authorized parties
- 3. ______ network vulnerabilities involve protecting asset such as locking a server in a rack closet or securing an entry point with a turnstile
- 4. short of roBOT NETwork
- 5. monitors a user's keystrokes
- 6. name for Trojan horses, viruses and worms
- 8. CIA for safeguarding data
- 11. Short for demilitarized zone it is firewalls that are often deployed as a buffer between the internet and your internal network
- 12. email scam that appears to be from a legitimate user or business
- 13. most common type of malware attack