Across
- 2. A digital barrier that monitors and filters network traffic.
- 3. Newly launched application used for Business Continuity Management.
- 6. When an attacker masks their identity to appear as a trusted source.
- 7. A network of private computers infected with malicious software and controlled as a group.
- 8. A copy of data stored separately to be used if the original is lost.
- 9. Software that secretly records what you do on your computer.
- 10. Storing and accessing data over the internet instead of your computer's hard drive.
- 11. A threat that comes from someone within the organization.
- 12. A phishing attack conducted specifically via SMS/Text message.
- 13. The "R" in the CHIRAG framework.
- 14. Malware that locks your files until a payment is made.
- 15. A secret string of characters used to authenticate a user.
Down
- 1. The "R" in TECH AURA, referring to the ability to bounce back.
- 4. A weakness or "hole" in a system that can be exploited.
- 5. The "____ Engineering" trick of manipulating people into giving up secrets.
- 7. A phishing attack specifically targeting high-profile executives.
- 8. Converting information into a secret code to hide its true meaning.
- 9. A fraudulent attempt to get info by disguising as a trustworthy entity in an email.
- 13. An umbrella term for malicious software like viruses and worms.
- 15. A software update designed to fix a security "bug."
