My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

ECS Cyber Crossword

Horizontales
Term that is widely used for unwanted email
Helps developers prevent security vulnerabilities in applications
Chief Information Security Officer for Fidelity
Annual cybersecurity conference sharing research, ideas, and using participant expertise to find vulnerabilities
Be wary of this type of WIFI
Two ___ Authentication provides an extra layer of security (aka 2FA)
The frequency of Penetration Testing varies based on ____ profile
Team that safeguards Customer data and Investments
Common forms of this are computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware and other malicious programs
The Enterprise Cybersecurity Organization is built around the _________framework
Team that detects adversaries, responds to their activities, and contains them
A malicious program designed to copy itself and can be spread by downloading files, exchanging CD/DVDs and USB sticks, copying files from servers, or by opening infected email attachments
The ____ provides governance and oversight of Fidelity’s Information Security program
Verticales
Governance, Risk & Compliance repository and work management system
Training curriculum required for all associates in an IT role, providing the knowledge, tools, and techniques to build more secure apps (Abv.)
The new corporate standard for mobile phones
Measures taken to protect a computer or computer system against unauthorized access or attack
___ Intelligence enables Fidelity to proactively prevent, detect, and understand past, current, and future cyber incidents
The act of acquiring sensitive data for use in fraudulent activities
ECS Mascot
All associates are required to complete Fidelity ___ (Abv.) to ensure they understand how to protect Fidelity information
SP2I is the program that helps associates _______ Fidelity information
Team that secures and manages access to information assets
Number of vendor service Criticality Ratings