1:00
en
CR
Security Awareness Campaign
8
Malware : Software that is intended to damage or disable computers and computer systems.
Phishing : Technique used to manipulate users into taking action by posing as a legitimate authority.
SocialEngineering : Non-technical method of intrusion that relies on human interaction and deception.
Spam : Unwanted or unsolicited messages sent out to numerous users in an attempt to advertise or send malicious software.
Databreach : The intentional or unintentional release of secure information to an untrusted environment.
APT : (Hint - Acronym) a stealthy, embedded and continuous computer hacking processes conducted by unauthorized personnel to gain access to sensitive data within a targeted network.
Encryption : A method of encoding data or messages to prevent vulnerability and unauthorized access.
Backup : A simple yet largely overlooked process that can help mitigate data loss.
You : Our strongest defense for Information Security (Hint - If it's not me, it must be ___!)
Security Awareness Campaign
Across:2. | Our strongest defense for Information Security (Hint - If it's not me, it must be ___!) | 4. | Software that is intended to damage or disable computers and computer systems. | 5. | Technique used to manipulate users into taking action by posing as a legitimate authority. | 6. | The intentional or unintentional release of secure information to an untrusted environment. | 8. | A method of encoding data or messages to prevent vulnerability and unauthorized access. |
| | Down:1. | Non-technical method of intrusion that relies on human interaction and deception. | 3. | A simple yet largely overlooked process that can help mitigate data loss. | 7. | (Hint - Acronym) a stealthy, embedded and continuous computer hacking processes conducted by unauthorized personnel to gain access to sensitive data within a targeted network. |
| |
© 2015
PuzzleFast.com, Noncommercial Use Only
Security Awareness Campaign
Across:2. | Our strongest defense for Information Security (Hint - If it's not me, it must be ___!) | 4. | Software that is intended to damage or disable computers and computer systems. | 5. | Technique used to manipulate users into taking action by posing as a legitimate authority. | 6. | The intentional or unintentional release of secure information to an untrusted environment. | 8. | A method of encoding data or messages to prevent vulnerability and unauthorized access. |
| | Down:1. | Non-technical method of intrusion that relies on human interaction and deception. | 3. | A simple yet largely overlooked process that can help mitigate data loss. | 7. | (Hint - Acronym) a stealthy, embedded and continuous computer hacking processes conducted by unauthorized personnel to gain access to sensitive data within a targeted network. |
| |
© 2015
PuzzleFast.com, Noncommercial Use Only