TCS Information Security Crossword

123456789101112131415161718192021
Across
  1. 2. A ____ is a program that reproduces itself over a network and can use up your computer’s resources and possibly shut your system down.
  2. 5. _______ is a software program that may be installed on your computer without your consent to monitor your use, send pop-up ads, redirect your computer to certain websites, or record keystrokes, which could lead to identity theft.
  3. 6. Process for secure disposal of paper based information
  4. 8. ________ Information is any information that can personally identify you, such as your name, address, phone numbers, Social Security number, bank account
  5. 9. Attack preventing availability of a system operation or service to an authorized user
  6. 15. A piece of software that is malicious or intrusive
  7. 17. Your ________ is like a Toothbrush use it regularly, change it often, and do not share it with anyone else.
  8. 18. Before you throw something in the _____, ask yourself if this something I would give to an unauthorized person or want to become or publicly available?
  9. 19. A software that detects, repairs, cleans, or removes infected files from a computer
  10. 20. Attack by which users are tricked into revealing sensitive information through emails appearing from organizations
  11. 21. ________ theft is the stealing of a person's financial information with the intention of committing fraud
Down
  1. 1. A _____ is a program that can sneak onto your computer often through an email attachment and then make copies of itself, quickly using up all available memory.
  2. 3. Act of listening to a private conversation which may reveal information which can provide access to a facility or network
  3. 4. Highest category of information classification in TCS
  4. 6. ______ engineering is referred to as an approach to gain access to information, primarily through misrepresentation, and often relies on the trusting nature of most individuals.
  5. 7. An update to fix vulnerabilities in software
  6. 10. Method of scrambling data that conceals the data's original meaning to prevent it from use by unauthorized people
  7. 11. Notification for ID deletion and Physical access revocation for attrites should be sent within ________ business day(s).
  8. 12. ________ surfing occurs when someone watches a user, trying to see what is on the user’s computer screen or typed on the keyboard in the hopes of gaining access to private information.
  9. 13. A weakness that can be taken advantage of to obtain unauthorized access to an asset
  10. 14. Minimum password length as per TCS security policy
  11. 16. is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.