Security Summit Crossword Puzzle

123456789101112131415161718192021
Across
  1. 2. The acronym for information about individuals that can be used to trace a person’s identity, such as full name, birth date, biometric data, social security number, etc.
  2. 7. An acronym for volatile memory within a computer that holds active processes, data, and applications.
  3. 9. This type of security describes measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm.
  4. 11. Lowe’s _______ _____ policy defines accepted practices, responsibilities and procedures for Lowe’s associates, non-associates and third parties using Lowe’s owned devices and who are authorized to work at home or a designated alternative work site.
  5. 14. A form of malware that encrypts a victim’s files in exchange for money. Usually, the victim receives instructions of what and how to pay to gain their access back.
  6. 15. A classification level for documents designed to only be distributed within Lowe’s and is also used in the Azure Information Protection labels.
  7. 16. This acronym allows associates to use one's personally owned device, rather than being required to use an officially provided device.
  8. 17. A weakness which can be exploited by a threat actor, such as an attacker, to cross privilege boundaries within a computer system.
  9. 19. ______ ________ refers to the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks (e.g. Yammer).
  10. 21. ______ ______ ___________ software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use, in motion, and at rest.
Down
  1. 1. _________________@lowes.com and the
  2. 3. _________ _________ and Disaster Recovery would allow Lowe’s to reduce the risk of data loss, reputational harm, and improve operations when dealing with the effects of significant unexpected events.
  3. 4. Lowe’s Security Operations Center (SOC) is now referred to as the Information Security ________ ________.
  4. 5. This type of social engineering, also known as piggybacking, is a physical security breach where an unauthorized person follows an authorized individual into a typically secured area.
  5. 6. An access control model that restricts system access to authorized users based on job function(s).
  6. 8. Unique physical characteristics, such as fingerprints, facial recognition, etc. that can be used for automated identification.
  7. 10. Technology policies, ___________ , and procedures define the parameters that associates must understand, acknowledge, and abide by to reduce risk to Lowe’s.
  8. 12. Phish button in Outlook are the correct places for Lowe’s associates to report suspicious emails.
  9. 13. Cybercriminals use this type of social engineering attack to impersonate high profile executives in an organization (e.g. CEO, CFO, etc.) hoping to leverage their authority to gain access to sensitive data or money.
  10. 18. Identity and _________ __________is a framework of policies and technologies for ensuring that the right users have the appropriate access to technology resources.
  11. 20. Scammer prey on innocent ________ ____________, especially around holiday time, while making Internet purchases using a web browser or a mobile app to try to gain access to their credit cards and sensitive personal information.