2019 – NCSAM Cyber Security Crossword Puzzle Challenge
Across
- 1. to a computer through a “back door.”
- 4. Acronym for Protected Health Information.
- 5. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
- 6. Stop. ____. Connect.
- 10. You should check these regularly.
- 13. Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.
- 14. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms, and ransomware.
- 16. A fraudulent action similar to phishing, using SMS (text) messages rather than e-mail messages to send bait message to people.
- 17. A piece of malware that often allows a hacker to gain remote
- 19. A technique used by hackers to obtain sensitive information.
- 21. The acronym for the month of cybersecurity awareness events.
- 22. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
- 23. Something you should never share with another person.
- 24. The month in which National Cyber Security Awareness Month occurs.
Down
- 2. Links with catchy titles that lure users into opening them.
- 3. Hacking or deception that imitates another person, software program, hardware device, or computer, with the intentions of bypassing security measures.
- 7. Kids and parents should be aware of these online bullies.
- 8. When someone follows a person into a secured area without proper credentials.
- 9. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- 11. Don’t download these unless you know and have confirmed the sender.
- 12. A personal identification number commonly associated with an ATM.
- 15. Malware that replicates itself, so it can spread to infiltrate other computers.
- 18. A type of malware that locks your computer until you pay to have it unlocked.
- 20. Someone who violates computer security for malicious reasons, kudos, or personal gain.
- 22. When a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network