Across
- 1. Three aspects of management that, when well-coordinated, ensure a company and its people behave ethically, run the business effectively, mitigate risks appropriately and comply with internal policies and external regulations
- 3. A formal and approved list of users who have defined access rights to an asset
- 5. Attempts to disrupt normal traffic of a targeted server, service or network to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources
- 6. Software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted
- 9. A technology and business process designed to detect and prevent violations to corporate policies regarding the use, storage, and transmission of sensitive data
- 10. Surveillance software that can record every keystroke made on a computer’s keyboard
- 13. The practice of testing a computer system or network to find vulnerabilities that cybercriminals could exploit
- 14. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
- 15. Represents a rapidly growing class of non-traditional computing devices that are connected to the internet to drive some sort of intelligent operation
- 16. The psychological manipulation of people into performing actions or divulging confidential information
- 17. Computer program used to prevent, detect, and remove malware
Down
- 2. The U.S. federal agency responsible for developing and maintaining the “Framework for Improving Critical Infrastructure Cybersecurity,” a collection of voluntary guidelines to help organizations manage their information security risks
- 4. Software used to monitor, log, provide alerts and analyze security events to support threat detection and incident response
- 7. Refers to a company security policy that allows for employees’ personal devices to be used in business
- 8. Devices or software designed to find and prevent malicious activity on corporate networks
- 11. Actions a company takes to manage the aftermath of a security breach or cyberattack
- 12. A type of authentication method where the proof of a user’s identity is gained by different independent sources