Cybersecurity Awareness Month 2025 Week 1
Across
- 1. your device can be infected with this bad software
- 4. this is a type of phishing but relates to messages sent via SMS
- 5. Bad actors usually add this to an email in order to get you to click on it and infect your device
- 8. this should be used to log in to you account and should not be shared with anyone.
- 10. this is found usually an the form of image or file that is sent with an email
- 11. this is a way of locking files in your electronic device in order for others not to access it
- 12. your device can be infected with this software that is used to spy on you
- 14. the end of an email address usually found after the @ symbol
- 15. this can be used to store information and transfer it from one device to another
- 16. a weakness in any system
Down
- 2. your device can be infected with this. it locks your files and the bad actor will ask for a payment in order to unlock it.
- 3. you should contact this team whenever you receive a suspicious email
- 6. you need to conduct these so that your device is properly protected from the latest threats
- 7. the name of this operating system can also be used to describe a feature of a building
- 9. This software is used to protect your electronic device from possible infections
- 13. Bad actors send these emails or messages pretending to be a reputable source