Across
- 2. A security benefit that verifies data is unmodified and therefore original, complete and intact.
- 6. Anything that is used in and is necessary to the completion of a business task.
- 7. An attack focusing on people rather than technology. This type of attack is psychological and aims to either gain access to information or to a logical or physical environment.
Down
- 1. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- 3. Software that automatically displays or downloads material when a user is offline.
- 4. A social engineering attack that attempts to collect information from victims. This attacks can take place over e-mail, text messages, through social networks or via smart phone apps.
- 5. An error or mistake in software coding or hardware design or construction
- 7. A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP.
