Cybersecurity Unit 1 Lesson 1

1234567891011121314151617
Across
  1. 4. Changes your directory
  2. 8. A set of steps to accomplish a task.
  3. 10. A set of techniques used to protect networks and digital information from attack, damage, or unauthorized access.
  4. 13. Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.
  5. 14. Guidelines that team members develop in order to be followed when working together.
  6. 15. A system that can distinguish between a human and an automated program.
  7. 16. Shows the contents of your directory
  8. 17. A process that converts human-readable text or data into a coded form.
Down
  1. 1. A team of individuals working together to investigate cyber events and anomalies.
  2. 2. A collection of rules detailing appropriate student behavior.
  3. 3. Software that is intended to do harm or damage.
  4. 5. The trail that you leave behind when you engage in online experiences.
  5. 6. To guess or discover, especially a password.
  6. 7. Websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network.
  7. 9. To confirm your identity using knowledge know only to you or information interpreted by you.
  8. 11. An attempt to discover information, especially passwords, through trial and error.
  9. 12. Irrelevant or inappropriate messaging sent through email to a large number of recipients, also known as junk mail.