National Computer Security Crossword

1234567891011121314
Across
  1. 3. historically IT departments drink a lot of this.
  2. 5. Malicious software designed to block access to a computer system until a sum of money is paid
  3. 7. Fraudulent email that looks like it comes from a reputable company attempting to get personal information
  4. 9. ___________Authentication a safety measure using another means in addition to your password and user name to gain access to a program or computer
  5. 10. ________bullying is using the internet, social media and other electronic means to post harmful, negative or threatening things about someone else
  6. 11. these should be constructed with at least 12 characters consisting of upper and lower case letters, a number and a special character.
  7. 13. fraudulent phone calls trying to trick you into revealing personal information or requesting money
Down
  1. 1. a flaw or weakness in a computer system that could be exploited in order to violate the systems security.
  2. 2. Always_____ your computer then you leave your workspace or are not directly using it.
  3. 4. a security measure that can be taken to make your email safe to send PHI if necessary.
  4. 6. ______down your computer when placing it in a carrying case and at least once a day so that HIT can send it information and updates.
  5. 8. _______ Media Facebook, Twitter, Instagram are examples of this.
  6. 12. authorization signed by a client so that protected health information can be shared or requested or can be shared
  7. 14. ________ IT is software and devices used without the Health IT Department knowledge or control