Cyber Security Awareness

123456789101112
Across
  1. 6. Using encryption and other security technologies to protect online activities and prevent unauthorized access to sensitive information.
  2. 7. A common form of social engineering that involves sending fraudulent emails or messages in order to steal information or spread malware.
  3. 9. The practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
  4. 10. A mindset and set of behaviors that prioritize cybersecurity and make it a fundamental part of organizational culture.
  5. 11. Policies and procedures for safeguarding sensitive data and ensuring its confidentiality, integrity, and availability.
  6. 12. The process of identifying, assessing, and mitigating cyber risks in order to protect against cyber attacks.
Down
  1. 1. Tools and techniques for detecting and removing malicious software, including viruses, worms, and Trojans.
  2. 2. A targeted form of phishing that involves customized messages designed to deceive a specific individual or group.
  3. 3. Strategies for creating strong, unique passwords and protecting them from unauthorized access.
  4. 4. Techniques used by cybercriminals to manipulate individuals into revealing sensitive information or taking harmful actions.
  5. 5. Best practices for keeping digital devices and online accounts clean and secure.
  6. 8. Best practices for staying safe while browsing the internet, including avoiding risky websites and downloading files from trusted sources.