My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Asset security

Across
It is the probability of exposure or loss from a cyber attack or data breach on the organization.
This is a list maintained to ensure that a set of sites are not to be accessed.
It is the information security standard created to handle financial information and increase controls around cardholder data to reduce credit card fraud.
It is a type of malware used to threaten to publish victim’s data or perpetually block access to it unless a ransom is paid.
It is the process of verifying oneself.
It is the act of exploiting a bug, design flaw, or taking advantage of configuration oversight and programming errors by using any vulnerabilities in a system or application to gain elevated access to protected resources.
It is a regulation in EU law on data protection and privacy in the European Union and the European Economic Area.
It is the weakness in a system that can be exploited by a cyber attack to gain unauthorized access to or perform unauthorized actions on a computer system.
These are the users with extra levels of access control.
The three pillars of security
Down
It is the assurance that someone cannot deny something.
It is a type of malware used to secure remote access to the computer.
It is a standalone malware computer program that replicates itself in order to spread to other computers.
It is a function that converts one value to another and this value cannot be reversed.
It is a technique used by criminals and cyber-crooks to manipulate or trick people into revealing confidential information.
It is the process of removing data from computers and media.
It is the process of verifying what you have access to.
It is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted source.
It is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
It is a type of malware that when executed replicates itself by modifying other computer programs and inserting its own code.