2019 – NCSAM Cyber Security Crossword Puzzle Challenge

123456789101112131415161718192021222324
Across
  1. 1. to a computer through a “back door.”
  2. 4. Acronym for Protected Health Information.
  3. 5. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
  4. 6. Stop. ____. Connect.
  5. 10. You should check these regularly.
  6. 13. Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.
  7. 14. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms, and ransomware.
  8. 16. A fraudulent action similar to phishing, using SMS (text) messages rather than e-mail messages to send bait message to people.
  9. 17. A piece of malware that often allows a hacker to gain remote
  10. 19. A technique used by hackers to obtain sensitive information.
  11. 21. The acronym for the month of cybersecurity awareness events.
  12. 22. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
  13. 23. Something you should never share with another person.
  14. 24. The month in which National Cyber Security Awareness Month occurs.
Down
  1. 2. Links with catchy titles that lure users into opening them.
  2. 3. Hacking or deception that imitates another person, software program, hardware device, or computer, with the intentions of bypassing security measures.
  3. 7. Kids and parents should be aware of these online bullies.
  4. 8. When someone follows a person into a secured area without proper credentials.
  5. 9. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  6. 11. Don’t download these unless you know and have confirmed the sender.
  7. 12. A personal identification number commonly associated with an ATM.
  8. 15. Malware that replicates itself, so it can spread to infiltrate other computers.
  9. 18. A type of malware that locks your computer until you pay to have it unlocked.
  10. 20. Someone who violates computer security for malicious reasons, kudos, or personal gain.
  11. 22. When a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network