Cyber Month!
Across
- 2. Name of the person who knows a lot about Big Risk because he IS a Big Risk
- 5. A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in electronic communication.
- 6. Animal you played during last week's Knowbe4 training
- 7. Password storing software available to CAMPUS employees
- 8. it refers to any software specifically designed to harm, disrupt, or gain unauthorized access to computer systems or data.
- 10. Clearly the best type of ice cream, don't argue
Down
- 1. The process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can decipher and read it.
- 3. The process of verifying the identity of a user, system, or application to ensure that access is granted only to authorized individuals or entities.
- 4. A security system designed to protect a network or computer from unauthorized access by monitoring and controlling incoming and outgoing network traffic.
- 9. secret combination of characters, numbers, or symbols that you use to access something