Information Security
Across
- 3. used to protect a computer from viruses
- 5. is any harmful program or application
- 7. ________ is the abbreviation for protected health information such as financial data, projected earnings, customer lists, HR information, computer programs, research data
- 10. type of malware that allows cyber criminals to hold data hostage or disable systems until their demands are met
- 12. messages received from outside the Mayo email servers will be flagged with ____ in the subject line.
- 13. a secret word or phrase that must be used to gain admission to something
- 16. a record of a patient's ______ information (such as medical history, care or treatments received, test results, diagnoses, and medications taken, MRN)
- 17. phishing over the phone
- 19. ______ is required when sending email containing (CBI) outside of Mayo Clinic
Down
- 1. healthcare data is a lucrative target for criminals because it may contain ________ information needed to try to commit identity theft or other financial crimes
- 2. __________ is an attempt to manipulate humans as a means of gaining unauthorized access to information or computer systems
- 4. unwanted email, usually an advertisement, that does not ask for personal information or attempt to compromise your computer
- 6. ______is the number one motivating factor of criminal organizations to target healthcare information
- 8. ______ theft in which someone wrongfully obtains and uses another person's personal data that involves fraud or deception, typically for economic gain
- 9. monthly newsletter published by OIS
- 11. department at Mayo that helps with Information Security needs
- 14. uses SMS text messages on mobile devices instead of email
- 15. who to call if you believe you received a vishing call
- 18. ______is the abbreviation for Confidential Business Information