Information Security

12345678910111213141516171819
Across
  1. 3. used to protect a computer from viruses
  2. 5. is any harmful program or application
  3. 7. ________ is the abbreviation for protected health information such as financial data, projected earnings, customer lists, HR information, computer programs, research data
  4. 10. type of malware that allows cyber criminals to hold data hostage or disable systems until their demands are met
  5. 12. messages received from outside the Mayo email servers will be flagged with ____ in the subject line.
  6. 13. a secret word or phrase that must be used to gain admission to something
  7. 16. a record of a patient's ______ information (such as medical history, care or treatments received, test results, diagnoses, and medications taken, MRN)
  8. 17. phishing over the phone
  9. 19. ______ is required when sending email containing (CBI) outside of Mayo Clinic
Down
  1. 1. healthcare data is a lucrative target for criminals because it may contain ________ information needed to try to commit identity theft or other financial crimes
  2. 2. __________ is an attempt to manipulate humans as a means of gaining unauthorized access to information or computer systems
  3. 4. unwanted email, usually an advertisement, that does not ask for personal information or attempt to compromise your computer
  4. 6. ______is the number one motivating factor of criminal organizations to target healthcare information
  5. 8. ______ theft in which someone wrongfully obtains and uses another person's personal data that involves fraud or deception, typically for economic gain
  6. 9. monthly newsletter published by OIS
  7. 11. department at Mayo that helps with Information Security needs
  8. 14. uses SMS text messages on mobile devices instead of email
  9. 15. who to call if you believe you received a vishing call
  10. 18. ______is the abbreviation for Confidential Business Information