Cybersecurity Unit 1 Lesson 1
Across
- 4. Changes your directory
- 8. A set of steps to accomplish a task.
- 10. A set of techniques used to protect networks and digital information from attack, damage, or unauthorized access.
- 13. Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.
- 14. Guidelines that team members develop in order to be followed when working together.
- 15. A system that can distinguish between a human and an automated program.
- 16. Shows the contents of your directory
- 17. A process that converts human-readable text or data into a coded form.
Down
- 1. A team of individuals working together to investigate cyber events and anomalies.
- 2. A collection of rules detailing appropriate student behavior.
- 3. Software that is intended to do harm or damage.
- 5. The trail that you leave behind when you engage in online experiences.
- 6. To guess or discover, especially a password.
- 7. Websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network.
- 9. To confirm your identity using knowledge know only to you or information interpreted by you.
- 11. An attempt to discover information, especially passwords, through trial and error.
- 12. Irrelevant or inappropriate messaging sent through email to a large number of recipients, also known as junk mail.