Cybersecurity Awareness Month Crossword Puzzle

123456789101112131415161718
Across
  1. 2. A __________________ is any unauthorized attempt to access, disrupt, steal or damage computer systems, networks, or data.
  2. 4. The best way to keep Cornerstone secure is to become a ________ ___________.
  3. 6. All customer and bank information that is no longer required must be ____________.
  4. 8. an image or recording that has been convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said
  5. 10. A _____ _______ is a security incident where unauthorized parties access sensitive or confidential information.
  6. 11. Malicious software designed to harm, exploit or otherwise compromise a computer system.
  7. 13. the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data.
  8. 15. Files containing sensitive information that are transferred in any way across the Internet must be encrypted and sent ___________.
  9. 16. Be sure to properly _____ ______ or lock your computer screens when leaving your work area.
  10. 17. A technique used to deceive individuals into providing sensitive information by masquerading as a trustworthy entity in electronic communications.
  11. 18. Create strong ___________ or passphrases and never share them with anyone else.
Down
  1. 1. A type of malware that encrypts a victim's files and demands payment for the decryption key.
  2. 3. the process of creating a synthetic replica of a person's voice using artificial intelligence and machine learning techniques.
  3. 5. Follow that Bank's ___ ________ for guidance regarding the use of artificial intelligence at the Bank.
  4. 7. Someone who tries to access data that they aren't authorized to view.
  5. 9. All customer and bank information must be _______ in designated storage areas during non-business hours as well as during business hours when not required for extended periods.
  6. 12. ____________ suspicious activity and security incidents plays a vital role in safeguarding the Bank.
  7. 14. The process of verifying the identity of a user or system, often through passwords, biometrics, or security tokens.