CSCU Module 12 – Secure Remote Working
Across
- 2. A flexible work style that allows employees to work outside the office
- 3. Information protected so unauthorized users cannot read it
- 5. An attack that tries many password combinations
- 9. Looking over someone's shoulder to steal information
- 10. An insecure network often targeted by cybercriminals
- 11. Rules that prevent accidental sharing of sensitive information
- 13. Programs not allowed by the organization
- 15. Tricks used to manipulate users into giving information
- 18. A password that is 12–16 characters with mixed character types
- 19. Fraudulent emails used to steal information
- 20. A device that prevents data exchange while charging
- 21. A long password made from multiple small words
- 23. A home network protected by a strong password
- 24. A security feature that protects video meeting data
- 25. Microsoft Teams feature that classifies and protects data
Down
- 1. A privacy tool that blocks the camera when not in use
- 4. A feature that must be controlled to prevent unauthorized display
- 6. Patches that fix security vulnerabilities
- 7. A secure encrypted connection for remote work
- 8. A login method requiring more than one verification step
- 12. An attack that overwhelms a system with traffic
- 14. Software that detects and removes malware
- 16. Malicious URLs designed to steal information
- 17. A required entry code for secure meetings
- 22. A Zoom feature that screens participants before entry