Cybersecurity Awareness

1234567891011121314151617181920212223
Across
  1. 1. ERROR Unintentional actions by people that can compromise security systems.
  2. 7. ___ your device before leaving your workplace is a good practice.
  3. 10. Connecting your device to a free access public wi-fi can lead to ___ attack.
  4. 12. A feature to switch off connections in mobile devices.
  5. 14. One of the factors to check whether the website is official and safe.
  6. 17. Always verify whether the website is ___ or not before entering any credentials.
  7. 18. Passwords like “123456” and “password” is in this category.
  8. 19. Best practice before downloading a software online. / Always ___ when you are calling someone.
  9. 21. Download mobile applications from an ___ app store.
  10. 23. What user lacks when they are easily fall into scam and poor understanding in security practices?
Down
  1. 2. Never click on an ___ if you received an email from an unknown sender.
  2. 3. Using an ___ version of software is like giving chances for hackers to hack.
  3. 4. This tool can track your typing habits and log your passwords without your knowledge.
  4. 5. ___ engineering is the art of manipulating humans in giving away all of your information.
  5. 6. Best practice if an unknown device wants to connect to your device.
  6. 8. Never share your sensitive information on ___.
  7. 9. Using a ___ password for all accounts is not a good practice.
  8. 11. An unauthorized individual who gains access to systems, often to modify or destroy data.
  9. 13. This method enhances security by requiring two or more forms of verification during authentication.
  10. 15. In an organization, who plays a role in ensuring data security?
  11. 16. What security method uses two forms of verification, like a password and a code?
  12. 20. Excessive background mobile ___ usage could indicate a potential hacking or malware activity on your device.
  13. 22. __ key + L is the shortcut to lock your screen.