Cybersecurity Awareness

1234567891011121314
Across
  1. 4. Settings that users can control to limit what an app can access on their device.
  2. 6. A technique used to steal sensitive information by tricking users through fake apps or emails.
  3. 9. A sum of money demanded by attackers in exchange for unlocking encrypted files.
  4. 11. The type of port that a Rubber Ducky uses to connect to a target machine.
  5. 13. malicious software that decrypt all user files after receiving money.
  6. 14. The best way to prevent Bluetooth attacks when not in use is to _______ your Bluetooth.
Down
  1. 1. Clicking ___ will lead you to download unwanted software to your device or visiting a phishing website
  2. 2. A software that protects your device from viruses.
  3. 3. A harmful software that can be delivered through a Rubber Ducky attack, download from unknown sources, and by clicking advertisements.
  4. 5. A ___ secretly monitors user activity.
  5. 7. Report to ___ if received a suspicious email from an unknown sender.
  6. 8. ___ is manipulating their victims in giving away sensitive information using phone calls.
  7. 10. A software that delivers advertising content randomly inside user device.
  8. 12. Keeping software and apps current to fix vulnerabilities that can be exploited