Security, Risks and Safeguards

1234567891011121314151617
Across
  1. 1. Social engineering attacks fool users to give up usernames and __________
  2. 7. A network ________ is a weakness or flaw in software, hardware, or organizational process, which when compromised by a threat can result in a security breach
  3. 9. malware disguised as legitimate software
  4. 10. assurance that someone cannot deny the validity of something
  5. 14. Attempting to target high-profile business executive or manager with emails and web pages that appear to be official
  6. 15. designed to lock users out of their system or deny access to data until ransom is paid
  7. 16. Cyber-attack that uses SMS text messages
  8. 17. CIA for maintaining consistency, accuracy and trustworthiness of data over its entire lifecycle
Down
  1. 2. CIA for data readily accessible for authorized parties
  2. 3. ______ network vulnerabilities involve protecting asset such as locking a server in a rack closet or securing an entry point with a turnstile
  3. 4. short of roBOT NETwork
  4. 5. monitors a user's keystrokes
  5. 6. name for Trojan horses, viruses and worms
  6. 8. CIA for safeguarding data
  7. 11. Short for demilitarized zone it is firewalls that are often deployed as a buffer between the internet and your internal network
  8. 12. email scam that appears to be from a legitimate user or business
  9. 13. most common type of malware attack