Cyber Security Awareness

123456789101112
Across
  1. 1. Be careful connecting to public _____.
  2. 7. is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system
  3. 8. unsolicited usually commercial messages (such as e-mails or text messages) sent to a large number of recipients
  4. 10. shorthand for malicious software. It is software developed by cyber attackers with the intention of gaining access or causing damage to a computer or network
  5. 11. What month is National Cyber Security Awareness Month?
  6. 12. True/False: Call I.T. Service desk right away when you suspect a phishing email
Down
  1. 2. is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rule
  2. 3. techniques of protecting computers, networks, programs and data from unauthorized access or attacks
  3. 4. a secret word or expression used by authorized persons to prove their right to access, information, etc.
  4. 5. when a scammer uses fraudulent emails or texts, or copycat websites to get you to share valuable personal information
  5. 6. type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access
  6. 9. is designed to spread from host to host and has the ability to replicate itself, through a file or document, without permission or knowledge of the user