CyberSecurity Awareness - Cyber Knowledge
Across
- 2. is a cybersecurity threat in which attackers use QR codes to redirect victims to malicious websites or prompt them to download harmful content.
- 4. email that is not wanted, email that is sent to large numbers of people and that consists mostly of advertising
- 6. a weakness that can be accidentally triggered or intentionally exploited
- 8. a software update inserted (or patched) into the code of an executable program that fixes bugs, installs new drivers
- 9. computer software that is provided usually for free but contains advertisements
- 12. a type of malicious software—or malware—that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return. Ransomware attacks can cause costly disruptions to operations and the loss of critical information and data.
- 13. a program that is designed to harm a computer by deleting data,
- 16. a string of words and characters that you type in to authenticate yourself
- 17. preventive cybersecurity action
- 18. a scam by which an email user is duped into revealing personal or confidential information which the scammer can use illicitly
- 19. A tailgating attack is a breach of security where an unauthorized actor gains access to a controlled area by closely following someone with legitimate access credentials.
- 20. a usually small self-contained and self-replicating computer program that invades computers on a network and usually performs a destructive action
Down
- 1. the act of obtaining or attempting to obtain sensitive information by manipulating an individual into revealing secure information
- 3. measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack
- 5. having or showing realization, perception, or knowledge
- 7. Employs deceptive text messages (SMS) to lure victims into sharing personal information or clicking malicious links.
- 10. software designed to interfere with a computer's normal functioning
- 11. computer software that secretly records information about the way you use your computer
- 14. a potential circumstance, entity or event capable of exploiting a vulnerability and causing harm
- 15. a secret series of numbers or letters that allows you to use a computer system
- 18. Personal Identifiable Information (PII) is defined as: Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect mean