Cybersecurity Awareness
Across
- 1. ERROR Unintentional actions by people that can compromise security systems.
- 7. ___ your device before leaving your workplace is a good practice.
- 10. Connecting your device to a free access public wi-fi can lead to ___ attack.
- 12. A feature to switch off connections in mobile devices.
- 14. One of the factors to check whether the website is official and safe.
- 17. Always verify whether the website is ___ or not before entering any credentials.
- 18. Passwords like “123456” and “password” is in this category.
- 19. Best practice before downloading a software online. / Always ___ when you are calling someone.
- 21. Download mobile applications from an ___ app store.
- 23. What user lacks when they are easily fall into scam and poor understanding in security practices?
Down
- 2. Never click on an ___ if you received an email from an unknown sender.
- 3. Using an ___ version of software is like giving chances for hackers to hack.
- 4. This tool can track your typing habits and log your passwords without your knowledge.
- 5. ___ engineering is the art of manipulating humans in giving away all of your information.
- 6. Best practice if an unknown device wants to connect to your device.
- 8. Never share your sensitive information on ___.
- 9. Using a ___ password for all accounts is not a good practice.
- 11. An unauthorized individual who gains access to systems, often to modify or destroy data.
- 13. This method enhances security by requiring two or more forms of verification during authentication.
- 15. In an organization, who plays a role in ensuring data security?
- 16. What security method uses two forms of verification, like a password and a code?
- 20. Excessive background mobile ___ usage could indicate a potential hacking or malware activity on your device.
- 22. __ key + L is the shortcut to lock your screen.