Introduction to Cybersecurity
Across
- 1. Its job is to put a digital signature on outgoing mail so servers could actually verify that it is you sending that email.
- 3. Unwanted messages are usually referred to as spam.
- 4. It's the third tool for email authentication. DMARC verifies that this address matches the “from” address you see.
- 8. when a victim is bullied and harassed through electronics.
- 9. Policy Framework (SPF)- an email authentication method that helps to identify the mail servers that are allowed to send email for a given domain.
- 10. This is a part of a computer system that is utilized to block unauthorized data.
- 12. protection against unauthorized access
- 13. It is the process of converting data into a different type of form or code.
- 17. Its an email authentication policy that protects against bad people who use fake email addresses.
- 18. It is an area where computer systems and networks are utilized.
- 19. program is referred to as clientless if it can operate wholly over the network without needing to install any software.
Down
- 1. an email authentication method that uses a digital signature to let the receiver of an email know that the message was sent and authorized by the owner of a domain.
- 2. this is when you pass an organization’s existing security systems.
- 5. spoof logos and make up fake email addresses. Scammers use familiar company names or pretend to be someone you know.
- 6. attempt to gain unauthorized access to a computer
- 7. a software used as an intent to destroy or disrupt unauthorized access.
- 11. Wifi protected access is a security standard for computing devices.
- 14. insurance- Cyber insurance is one option that can help protect your business against losses resulting from a cyber attack.
- 15. This is when users can send and receive data using a virtual private network.
- 16. authentication This technology allows a receiving server to verify an email from your company and block emails from an imposter.