Cybersecurity Awareness Month
Across
- 5. A strategic procedures that were carefully designed and implemented to ensure the success of our organization.
- 9. This scavenger hunt poster is located in the Marketing\BRANDING G drive folder.
- 10. A small sample of someone's voice can be used to generate speech that sounds like a real person.
- 12. _____ _____ is a gold mine of information hackers can use to trick you and your co-workers.
- 13. This group keeps shelling out the coin for ransomware that has been used to strongarm companies out of millions and bring even the most robust IT teams to their knees.
- 16. A process that requires less effort on the attacker's part and means they can target a greater number of people.
- 17. Many attackers use ____ and manipulation to scam people out of money or information.
- 20. Server as the first responders to security incidents by reporting the incident immediately.
Down
- 1. A calculating and cunning group that know just the right tactics to convince users to download malware, click suspicious links or share confidential information.
- 2. His mission is to lock up treasured information and data for his own uses, or just because he doesn't want you to have it.
- 3. Takes on the form of users just like you in an attempt to keep the actions of their cybercriminal comrades hidden.
- 4. Social ____ is one of the most common ways bad actors break into computer networks.
- 6. This is where hackers create and distribute false information to manipulate your thoughts and actions.
- 7. Social engineering is the art of hacking human _____.
- 8. The top attack method for social engineers.
- 11. When you should report anything unusual.
- 14. A form of malware that encrypts data or locks up systems until the victim pays a ransom.
- 15. _____ unattended workstations.
- 18. One of the goals of social engineering is to gain _____ access.
- 19. A policy which means keeping important items locked away when not in use.