Cybersecurity Awareness Puzzle
Across
- 3. An event or occurrence, often unexpected or problematic.
- 5. Hidden programs providing remote access.
- 10. Business Email Compromise, impersonating executives, vendors, or partners to steal funds or sensitive info.
- 11. More than one kind of proof.
- 12. Special access or rights given to certain users.
- 13. Self-replicating malware spreading across systems.
- 14. Encrypts data and demands payment for decryption.
- 16. You should do this to all of your software.
- 19. Voice (phone-based) phishing.
- 20. SMS/text-based phishing.
- 22. Security Awareness Training is provided ___.
Down
- 1. Proof of who someone is.
- 2. Permission to access a system, file, or resource.
- 4. A modification or update to a system, process, or configuration.
- 6. Protection against threats or attacks on computer and data.
- 7. Using someone else's access without permission to enter a building.
- 8. Records everything you type on a keyboard.
- 9. A system that blocks unauthorized access to a network or computer.
- 15. Cheating someone out of Money or personal Information
- 17. Deceptive emails that trick users into clicking malicious links or sharing credentials.
- 18. Secret words or codes used to unlock accounts.
- 21. Copying data to keep it safe in case something is lost or damaged.