Cybersecurity Risk
Across
- 2. Convert an item, such as data, into a code or cipher.
- 4. Short for malicious software
- 7. Software that encrypts data on someone's device until that person agrees to pay to regain access.
- 8. Similar to a password but uses multiple words together.
- 10. Legitimate of innocent-looking emails asking you to respond with personal data or to click on a link.
- 11. Disguising an email address or phone number to convince you that you are interacting with a trusted friend or source.
- 13. False or inaccurate information.
- 14. Acronym for Pause, Ask, Think.
- 15. Range of activities that guide how we manage digital data.
Down
- 1. Measures taken to protect computer systems.
- 3. Type of identity that is established by an internet user.
- 5. Software written to damage a computer's performance, steal, or alter data.
- 6. The practice of phishing using text messages
- 9. Type of data that can be found as part of public record.
- 12. Type of data that should be protected from public view.