Cyber Security Awareness
Across
- 1. A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite
- 3. Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system.
- 7. The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment.
- 9. Alerts used as a warning of danger.
- 13. An attempt by hackers to damage or destroy a computer network or system.
- 14. Something that shows up in an email
- 16. An attack focusing on people rather than technology
- 17. A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual. The fraud is due to the attacker impersonating someone else.
- 18. A dishonest scheme; a fraud.
- 19. A form of malware that monitors user activities and reports them to an external their party
- 20. The likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization
- 22. A specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and
Down
- 2. Identity and Privacy Protection
- 4. A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software
- 5. A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP
- 6. Someone attempting to create Identity fraud
- 8. Malware is defined as any device
- 10. A security tool, which may be a hardware or software solution that is used to filter network traffic.
- 11. The ultimate call control center that gives customers full control of all T-Mobile's scam protection options
- 12. The act of falsifying the identity of the source of a communication or interaction. It is possible to spoof IP address, MAC address and email address.
- 15. The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization
- 21. Hard to detect both by Users