CYBERSECURITY CROSSWORD CHALLENGE

12345678910111213141516
Across
  1. 3. An attack using computer program to guess the correct user credentials
  2. 5. If you receive suspicious ____ then hover over it with your mouse before clicking to make sure it is real.
  3. 6. Protocol used for encryption which protects data in transit
  4. 8. A piece of data stored on your device by websites you visit. Not chocolate chip, though
  5. 11. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  6. 13. Spoofing is when bad actors create a fake ______ and send phish emails to imitate a business
  7. 14. Encryption technique used to protect data
  8. 15. A sequence of words or text used to control access to a computer; similar to a password.
  9. 16. A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket"
Down
  1. 1. The act of tricking someone into giving up sensitive information
  2. 2. System(software or hardware) used to manage network security and monitor traffic
  3. 4. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  4. 7. Unauthorized disclosure of this category of classified information could be expected to cause damage to organisation security
  5. 9. Any circumstance or event with the potential to adversely impact agency operations, assets, or individuals.
  6. 10. This testing simulates a full stack attack, probing every possible weakness
  7. 12. Malicious program that can replicate itself