Across
- 2. A ____ is a program that reproduces itself over a network and can use up your computer’s resources and possibly shut your system down.
- 5. _______ is a software program that may be installed on your computer without your consent to monitor your use, send pop-up ads, redirect your computer to certain websites, or record keystrokes, which could lead to identity theft.
- 6. Process for secure disposal of paper based information
- 8. ________ Information is any information that can personally identify you, such as your name, address, phone numbers, Social Security number, bank account
- 9. Attack preventing availability of a system operation or service to an authorized user
- 15. A piece of software that is malicious or intrusive
- 17. Your ________ is like a Toothbrush use it regularly, change it often, and do not share it with anyone else.
- 18. Before you throw something in the _____, ask yourself if this something I would give to an unauthorized person or want to become or publicly available?
- 19. A software that detects, repairs, cleans, or removes infected files from a computer
- 20. Attack by which users are tricked into revealing sensitive information through emails appearing from organizations
- 21. ________ theft is the stealing of a person's financial information with the intention of committing fraud
Down
- 1. A _____ is a program that can sneak onto your computer often through an email attachment and then make copies of itself, quickly using up all available memory.
- 3. Act of listening to a private conversation which may reveal information which can provide access to a facility or network
- 4. Highest category of information classification in TCS
- 6. ______ engineering is referred to as an approach to gain access to information, primarily through misrepresentation, and often relies on the trusting nature of most individuals.
- 7. An update to fix vulnerabilities in software
- 10. Method of scrambling data that conceals the data's original meaning to prevent it from use by unauthorized people
- 11. Notification for ID deletion and Physical access revocation for attrites should be sent within ________ business day(s).
- 12. ________ surfing occurs when someone watches a user, trying to see what is on the user’s computer screen or typed on the keyboard in the hopes of gaining access to private information.
- 13. A weakness that can be taken advantage of to obtain unauthorized access to an asset
- 14. Minimum password length as per TCS security policy
- 16. is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.
