Cyber Security Crossword
Across
- 2. Always use UTC's ______ access solution to connect to the UTC network when using an unsecure wireless network. This ensures that any data sent or received over the wireless network is encrypted and protected.
- 6. 87% of what enter through email attachments and links and have cost companies upwards of $300,000,000? This is also the name for a computer program that is designed to gain access, replicate to peer computers, and do a specific task (like send spam), as well as many other malicious behaviors.
- 7. Which department should you get approval from when downloading software?
- 8. A red flag of a phishing email can be an unknown ____ address.
- 9. What is a type of computer malware that typically infects a computer through a successful email phishing attempt? This can block access to files on the computer using encryption and attempts to spread to other systems on the network.
- 11. How many characters should an ideal password have at the least?
Down
- 1. When you receive a suspicious (spam/phishing) email you should click on the '_______ Phishing' button.
- 3. Social _____________ is a scam where an attacker attempts to gain the trust of the target, typically over the phone but it could be in person or through email, with the goal of obtaining information.
- 4. You cannot save company information on what kind of devices?
- 5. Do not use the same ________ for everything.
- 10. If you need to transfer a large file you should you your business unit’s ___ solution?