CSCU Module 12 – Secure Remote Working

12345678910111213141516171819202122232425
Across
  1. 2. A flexible work style that allows employees to work outside the office
  2. 3. Information protected so unauthorized users cannot read it
  3. 5. An attack that tries many password combinations
  4. 9. Looking over someone's shoulder to steal information
  5. 10. An insecure network often targeted by cybercriminals
  6. 11. Rules that prevent accidental sharing of sensitive information
  7. 13. Programs not allowed by the organization
  8. 15. Tricks used to manipulate users into giving information
  9. 18. A password that is 12–16 characters with mixed character types
  10. 19. Fraudulent emails used to steal information
  11. 20. A device that prevents data exchange while charging
  12. 21. A long password made from multiple small words
  13. 23. A home network protected by a strong password
  14. 24. A security feature that protects video meeting data
  15. 25. Microsoft Teams feature that classifies and protects data
Down
  1. 1. A privacy tool that blocks the camera when not in use
  2. 4. A feature that must be controlled to prevent unauthorized display
  3. 6. Patches that fix security vulnerabilities
  4. 7. A secure encrypted connection for remote work
  5. 8. A login method requiring more than one verification step
  6. 12. An attack that overwhelms a system with traffic
  7. 14. Software that detects and removes malware
  8. 16. Malicious URLs designed to steal information
  9. 17. A required entry code for secure meetings
  10. 22. A Zoom feature that screens participants before entry