CyberSecurity Awareness Month 2024

123456789101112
Across
  1. 2. Regularly released enhancements to software or applications that fix vulnerabilities and provide new features.
  2. 5. A security attack in which the user is tricked into downloading malware, spyware, or other harmful software onto their mobile device via SMS text messages.
  3. 10. A secret combination of characters used to access an account or device.
  4. 11. An enhanced security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity.
  5. 12. A type of barcode that can be scanned to access information quickly, often used with smartphones.
Down
  1. 1. A method of phishing where the fraudster uses phone calls to lure victims into divulging personal information.
  2. 3. Technology that simulates human intelligence processes through automated algorithms.
  3. 4. Engineering Tactics that manipulate individuals into giving up confidential information, often by exploiting human psychological weaknesses.
  4. 6. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
  5. 7. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  6. 8. Synthetic media in which a person in an existing image or video is replaced with someone else's likeness, often using advanced machine learning techniques.
  7. 9. A deceptive attempt to obtain sensitive information by pretending to be a trustworthy entity in digital communication.