National Computer Security Crossword
Across
- 3. historically IT departments drink a lot of this.
- 5. Malicious software designed to block access to a computer system until a sum of money is paid
- 7. Fraudulent email that looks like it comes from a reputable company attempting to get personal information
- 9. ___________Authentication a safety measure using another means in addition to your password and user name to gain access to a program or computer
- 10. ________bullying is using the internet, social media and other electronic means to post harmful, negative or threatening things about someone else
- 11. these should be constructed with at least 12 characters consisting of upper and lower case letters, a number and a special character.
- 13. fraudulent phone calls trying to trick you into revealing personal information or requesting money
Down
- 1. a flaw or weakness in a computer system that could be exploited in order to violate the systems security.
- 2. Always_____ your computer then you leave your workspace or are not directly using it.
- 4. a security measure that can be taken to make your email safe to send PHI if necessary.
- 6. ______down your computer when placing it in a carrying case and at least once a day so that HIT can send it information and updates.
- 8. _______ Media Facebook, Twitter, Instagram are examples of this.
- 12. authorization signed by a client so that protected health information can be shared or requested or can be shared
- 14. ________ IT is software and devices used without the Health IT Department knowledge or control