Cybersecurity Awareness
Across
- 2. A wireless technology standard using radio waves to communicate over short distances.
- 4. Sending of a fraudulent email attempting to get personal information.
- 5. Fraudulent text message designed to trick people into giving up personal information.
- 7. Used to create a secure, encrypted connection between your computer and the Internet.
- 9. Fraudulent phone calls or voice messages purporting to be from a reputable company in order to trick individuals into revealing personal information.
- 10. Malicious software designed to block access to a computer system and/or files until a sum of money is paid.
- 11. Harmful computer programs such as viruses, worms, or trojans used by cybercriminals to gain access to your computer.
Down
- 1. A flaw or weakness in a computer system or software application that could be exploited to compromise security of the system or application.
- 3. Verification of identity.
- 4. A sequence of words or text used to control access to a computer; similar to a password.
- 6. Before clicking on this, you should hover over it to verify it actually goes where it claims it does.
- 8. Should be as long as possible and constructed from a variety of character sets.