Cyber Security
Across
- 4. Set your computer to _ _ _ _ _ _ _ _ _ _ _ _ _ check for new software updates
- 5. Chief Information Security Officer
- 6. To protect personal information, avoid sending it via
- 10. Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
- 14. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
- 15. Hardware and/or software mechanisms to prevent unauthorized users from accessing a computer network
- 16. A malicious program designed to record which keys are pressed on a computer keyboard
- 19. _ _ _ _ _ _ engineering refers to the methods attackers use to manipulate people into sharing sensitive information
- 21. Never post private and confidential _ _ _ _ _ _ _ _ _ _ _ such as your username or password
- 22. Unwanted advertising that comes to your email address
- 23. Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
- 25. An unauthorized person seeking to maliciously disrupt or damage a computer
- 26. a string of words that must be used to gain access to a computer system or service
- 27. The assurance that the confidentiality of, and access to, certain information about an entity is protected
- 28. An Internet scam that targets unsuspecting users through email
Down
- 1. A technology that allows us to access our files and/or services through the internet from anywhere in the world
- 2. Always _______your computer when you leave your desk
- 3. Small files that Web sites put on your computer hard disk drive when you first visit
- 5. Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use
- 7. Domino's is known for selling
- 8. Malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim’s data
- 9. Global system of interconnected computer networks that use the Internet protocol suite
- 11. media websites and applications that enable users to create and share content or to participate in social networking
- 12. An acronym that stands for distributed denial of service – a form of cyber attack
- 13. A body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
- 14. A characteristic or specific weakness that renders an organization or asset open to exploitation.
- 17. Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
- 18. An attempt by hackers to damage or destroy a computer network or system
- 20. A type of malware designed to block access to a computer system or data until a sum of money is paid
- 24. A system invented by Google that uses a test to establish if a user is a human or a robot
- 27. A regular system update that is designed to cover security blunders that have been discovered