Across
- 2. alternative access to a system for malware, sometimes an entry point by someone who leaves a company, or used to re-establish a connection
- 6. A data handling regulation only found in CANADA
- 11. The 'A' in the CIA Triade
- 12. Vulnerability + Threat =
- 13. A script _______ is also known as a green hat hacker or someone who is new to programming little experience
- 15. Using a voice channel to conduct phishing
- 17. Organization that publishes cybersecurity frameworks
- 18. Psychological control discouraging an attack
- 19. A regulation applicable to Europe
- 20. A control such as a gateway or fence
Down
- 1. information that we may have received can be absolutely attributed to somebody. There’s no way that they can take it back.
- 3. The 'C' in the CIA Triade
- 4. fancy word for information gathering, can be active or passive
- 5. "hacking the human"
- 7. Acronym for a military/state or crime syndicates with lot of resources to attack
- 8. provides a common basis for the coordination of standards development for the purpose of systems interconnection
- 9. Hacker with a political agenda
- 10. Can be polymorphic and is usually memory resident
- 14. Acronym for information that is freely available for information gathering
- 16. The 'I' in the CIA Triade