Kiewit Cyber Security Awareness 2022
Across
- 2. ___must be 14 characters long, including upper case, lower case, and special characters
- 3. Use____________ information only for the purposes for which it was collected.
- 5. A security incident or compromise can occur even with security ________ and security awareness training in place.
- 10. Ensure downloaded ____________ is properly licensed and authorized before installing.
- 12. _________________attacks, such as spear phishing and CEO Fraud, involve research on the target before the attack is launched.
Down
- 1. Safe ______ handling practices are critical at each step of accessing, sharing, transmitting, retaining, and destroying ______.
- 2. When somebody sends an e-mail with a link to a bogus website it is called______.
- 4. Users should_________their systems when leaving them unattended.
- 6. This can slow down your computer AND watch everywhere you go on the internet.
- 7. A software used to perform malicious actions.
- 8. Chief Information Security Officer
- 9. Kiewit may ___________ your internet usage.
- 11. Kiewit systems will automatically lock after ______ failed attempts.