CSAW 2025

123456789101112131415
Across
  1. 1. A set of instructions written in a programming language that a computer can understand and execute.
  2. 6. Unwanted or unsolicited digital communication, often sent in bulk.
  3. 7. Software that automatically displays or downloads advertising material.
  4. 8. Virtual A service that encrypts your internet connection for privacy.
  5. 9. State A country that engages in cyber activities, often for strategic, political, or economic purposes
  6. 11. Software that enables unauthorized access to a computer while hiding its presence.
  7. 13. A person who uses computers to gain unauthorized access to data.
  8. 14. The mailbox you can send all your SETA inquiries to.
Down
  1. 2. A type of synthetic media where an image, video, or audio recording is manipulated using artificial intelligence (AI).
  2. 3. A secret word or phrase used to gain access to a computer system.
  3. 4. A network of infected computers controlled by a hacker.
  4. 5. Trust A security model that assumes no user or device is trusted by default.
  5. 7. The frequency of which you must take Cyber Security Awareness Training
  6. 10. A type of malware that disguises itself as a legitimate software.
  7. 12. Unauthorized access or compromise of a system, network, or data
  8. 15. Software that secretly monitors and collects information about users.