Security Awareness Crossword Puzzle

1234567891011121314151617
Across
  1. 7. when a person tags along with another person who is authorized to gain entry into restricted areas.
  2. 8. The process of taking plain text and scrambling it into an unreadable format.
  3. 10. Should be constructed of upper and lower case letters, numbers, and special characters.
  4. 11. The "I" in the CIA Triad. Protection from unauthorized changes.
  5. 13. The process or action of verifying the identity of a user or process.
  6. 14. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drives.
  7. 16. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
  8. 17. A flaw or weakness in a computer system that could be exploited to violate the systems security.
Down
  1. 1. Facebook, Twitter, Instagram, etc. (two words)
  2. 2. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  3. 3. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  4. 4. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  5. 5. The address of a webpage.
  6. 6. The "C" in the CIA Triad. Protection of information from unauthorized access.
  7. 7. A fraudulent email purportedly from a reputable company attempting to get personal information.
  8. 9. The "A" in the CIA Triad. It ensures authorized users have access.
  9. 12. A sequence of words or text used to control access to a computer; similar to a password.
  10. 15. the automated recognition of individuals by means of unique physical characteristics, typically for the purpose of security.