Cybersecurity Awareness

1234567891011
Across
  1. 2. A wireless technology standard using radio waves to communicate over short distances.
  2. 4. Sending of a fraudulent email attempting to get personal information.
  3. 5. Fraudulent text message designed to trick people into giving up personal information.
  4. 7. Used to create a secure, encrypted connection between your computer and the Internet.
  5. 9. Fraudulent phone calls or voice messages purporting to be from a reputable company in order to trick individuals into revealing personal information.
  6. 10. Malicious software designed to block access to a computer system and/or files until a sum of money is paid.
  7. 11. Harmful computer programs such as viruses, worms, or trojans used by cybercriminals to gain access to your computer.
Down
  1. 1. A flaw or weakness in a computer system or software application that could be exploited to compromise security of the system or application.
  2. 3. Verification of identity.
  3. 4. A sequence of words or text used to control access to a computer; similar to a password.
  4. 6. Before clicking on this, you should hover over it to verify it actually goes where it claims it does.
  5. 8. Should be as long as possible and constructed from a variety of character sets.