CYBERSECURITY CROSSWORD CHALLENGE
Across
- 3. If you receive suspicious ____ then hover over it with your mouse before clicking to make sure it is real.
- 5. Encryption technique used to protect data
- 7. A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket"
- 8. Any circumstance or event with the potential to adversely impact agency operations, assets, or individuals.
- 10. A sequence of words or text used to control access to a computer; similar to a password.
- 12. System(software or hardware) used to manage network security and monitor traffic
- 13. Malicious program that can replicate itself
- 15. An attack using computer program to guess the correct user credentials
- 16. This testing simulates a full stack attack, probing every possible weakness
Down
- 1. Unauthorized disclosure of this category of classified information could be expected to cause damage to organisation security
- 2. Protocol used for encryption which protects data in transit
- 4. Spoofing is when bad actors create a fake ______ and send phish emails to imitate a business
- 6. The act of tricking someone into giving up sensitive information
- 9. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- 11. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
- 14. A piece of data stored on your device by websites you visit. Not chocolate chip, though