Kiewit Cyber Security Awareness 2022

123456789101112
Across
  1. 2. ___must be 14 characters long, including upper case, lower case, and special characters
  2. 3. Use____________ information only for the purposes for which it was collected.
  3. 5. A security incident or compromise can occur even with security ________ and security awareness training in place.
  4. 10. Ensure downloaded ____________ is properly licensed and authorized before installing.
  5. 12. _________________attacks, such as spear phishing and CEO Fraud, involve research on the target before the attack is launched.
Down
  1. 1. Safe ______ handling practices are critical at each step of accessing, sharing, transmitting, retaining, and destroying ______.
  2. 2. When somebody sends an e-mail with a link to a bogus website it is called______.
  3. 4. Users should_________their systems when leaving them unattended.
  4. 6. This can slow down your computer AND watch everywhere you go on the internet.
  5. 7. A software used to perform malicious actions.
  6. 8. Chief Information Security Officer
  7. 9. Kiewit may ___________ your internet usage.
  8. 11. Kiewit systems will automatically lock after ______ failed attempts.