CyberSecurity Awareness 2021

1234567891011121314151617181920212223242526
Across
  1. 1. 123456 and MyDOB01012010 are examples of what kind of Password?
  2. 4. a type of malware that functions by spying on user activity without their knowledge and includes activity monitoring, collection keystrokes, data harvesting capabilities
  3. 6. a type of software application or script that performs tasks on command allowing an attacker to take complete control remotely of an affected compute
  4. 8. a form of malware that deliberately prevents you from accessing files on your computer holding your data hostage
  5. 9. refers to a company security policy that allows for employees own devices to be used in business
  6. 10. a technology that allows us to access our files and/or services through the internet from anywhere
  7. 11. a group of computers, printers and devices that are interconnected and governed as a whole
  8. 12. an umbrella term that describes all forms of malicious software designed to wreak havoc on a computer
  9. 13. the moment a hacker successfully exploits a vulnerability in a computer or device and gains access to its files and network
  10. 16. disruptive, unsolicited messages (such as emails, text messages, or Internet postings) especially commercial messages, sent to a large number of recipients or posted in a large number of places.
  11. 17. a tool that allows the user the user to remain anonymous while using the internet by masking the location and encrypting traffic
  12. 19. a malicious application or script that can be used to take advantage of a computer’s vulnerability
  13. 20. misspelled words and a sense of urgency for you to take a questionable action an email, are be considered to be
  14. 21. subject matter of the most clicked on email from our 11/07/21 phish campaign
  15. 22. the process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity.
  16. 23. Engineering the art of manipulating, influencing or deceiving you in order to gain control over your computer system.
  17. 24. type of phishing that is a small, focused, targeted attack via email on a particular person or organization with the goal to penetrate their defenses.
  18. 25. a type of malware aimed to corrupt, erase o modify information on a computer before spreading to others
  19. 26. a set of programs that tell a computer to perform a task
Down
  1. 2. the process of encoding data to prevent theft by ensuring the data can only be accessed with a key
  2. 3. a defensive technology designed to keep the bad guys out
  3. 5. a piece of malware that can replicate itself in order to spread the infection to other connected computers
  4. 7. a method used by social engineers to gain access to a building or other protected area.
  5. 11. an audio or video clip that has been edited and manipulated to seem real or believable and can easily convince people into believing a story or theory that may result in user-behavior that causes a political or financial impact
  6. 12. subject matter of the most clicked on email from our 11/14/21 phish campaign
  7. 14. an internet version of a home address for your computer which is identified when it communication over a network
  8. 15. October is Awareness Month for this
  9. 18. MyCowRanAwayToTheMoon is an example of a