Cybersecurity Awareness Month

1234567891011121314151617
Across
  1. 2. Fraudulent phone calls or voice messages purporting to be from reputable companies or a department in your own company in order to trick individuals into revealing personal information.
  2. 3. A sequence of words or text used to control access to a computer; similar to a password
  3. 5. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  4. 8. The process of taking plain text and scrambling it into an unreadable format.
  5. 9. Hardware or software designed to prevent unauthorized access to or from a private network
  6. 10. Fraudulent text messages pretending to be from reputable companies in order to trick individuals into revealing personal information.
  7. 12. A means to verify identity
  8. 13. The address of a webpage. Check the validity of it before clicking it.
  9. 15. Should be constructed of upper case and lower case letters, numbers, special characters, and at least 16 characters long.
  10. 16. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer.
  11. 17. The protection, restoration, and prevention of damage to a computer and the information contained therein to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.
Down
  1. 1. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  2. 2. A flaw or weakness in a computer system, network, application, or software that could be exploited to violate the system’s security.
  3. 4. A fraudulent email pretending to be from a reputable person or company attempting to get your information.
  4. 6. Software created specifically to help detect, prevent, and remove malware (malicious software).
  5. 7. Security tool that creates a secure, encrypted connection between you and the internet (three letter acronym)
  6. 10. Facebook, Twitter, Instagram, etc. (Two words, no spaces)
  7. 11. A person who uses computers to gain unauthorized access to data. AKA “bad actor”
  8. 14. Unauthorized Access to a network, information systems, or application.