1:00
en
CR
Information Security Awareness Training
16
VIRUS : Software programs designed to spread from one computer to another and interfere with computer operation.
USER : An individual that is authorized to access the firm resources.
CLIENT : A person or organization using the services of our lawyers.
PASSWORD : A secret word or string of characters that is used for authentication.
CONFIDENTIAL : Private or restricted information.
SOCIALENGINEERING : Psychological attack used by cyber attackers to deceive their victims. (two words)
THREAT : A person or thing likely to cause damage or danger.
AUTHENTICATE : To verify the identify of someone or something.
ENCRYPTION : The process of encoding messages.
LOGIN : The process of presenting an identity and authentication to gain access to information systems.
TOKEN : Something that a user possesses and controls used to authenticate.
PHISHING : An attempt to acquire sensitive information such as usernames, passwords, etc.
LOSS : Unrecoverable business resources that are ruined as a result of a disaster.
PERMISSION : A special role that can be granted to a user to perform their work.
SPAM : Unwanted or unsolicited email.
ONGUARD : The name of the firm's Information Security Awareness Program.
RISK : A measure of the exposure to which an organization may be subjected.
SECURITY : The practice of reducing the risk of threats and vulnerabilities.
SPOOFING : Trickery that makes a message appear as if it came from an authorized IP address.
Information Security Awareness Training
Across:| 5. | A special role that can be granted to a user to perform their work. | | 9. | Something that a user possesses and controls used to authenticate. | | 10. | An individual that is authorized to access the firm resources. | | 11. | Trickery that makes a message appear as if it came from an authorized IP address. | | 12. | Unrecoverable business resources that are ruined as a result of a disaster. | | 15. | Private or restricted information. |
| | Down:| 1. | The process of encoding messages. | | 2. | A person or organization using the services of our lawyers. | | 3. | To verify the identify of someone or something. | | 4. | Software programs designed to spread from one computer to another and interfere with computer operation. | | 5. | A secret word or string of characters that is used for authentication. | | 6. | Unwanted or unsolicited email. | | 7. | The practice of reducing the risk of threats and vulnerabilities. | | 8. | An attempt to acquire sensitive information such as usernames, passwords, etc. | | 13. | The name of the firm's Information Security Awareness Program. | | 14. | A measure of the exposure to which an organization may be subjected. |
| |
© 2015
PuzzleFast.com, Noncommercial Use Only
Information Security Awareness Training
Across:| 5. | A special role that can be granted to a user to perform their work. | | 9. | Something that a user possesses and controls used to authenticate. | | 10. | An individual that is authorized to access the firm resources. | | 11. | Trickery that makes a message appear as if it came from an authorized IP address. | | 12. | Unrecoverable business resources that are ruined as a result of a disaster. | | 15. | Private or restricted information. |
| | Down:| 1. | The process of encoding messages. | | 2. | A person or organization using the services of our lawyers. | | 3. | To verify the identify of someone or something. | | 4. | Software programs designed to spread from one computer to another and interfere with computer operation. | | 5. | A secret word or string of characters that is used for authentication. | | 6. | Unwanted or unsolicited email. | | 7. | The practice of reducing the risk of threats and vulnerabilities. | | 8. | An attempt to acquire sensitive information such as usernames, passwords, etc. | | 13. | The name of the firm's Information Security Awareness Program. | | 14. | A measure of the exposure to which an organization may be subjected. |
| |
© 2015
PuzzleFast.com, Noncommercial Use Only