Security Awareness Puzzle 2015

12345678910111213141516171819202122232425262728293031323334
Across
  1. 4. To protect personal information, avoid sending it via_________.
  2. 5. A __________ is often an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus.
  3. 8. Never share your _________ with another person.
  4. 12. Healthy email always includes a clear and specific ____________ line.
  5. 13. Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
  6. 14. A collection of information that is organized so that it can easily be accessed, managed, and updated.
  7. 16. Choose a password that is easy for you to ____________ but hard for someone to guess.
  8. 18. Do not leave your laptop or computer ____________.
  9. 20. Passwords should be _________ every 3-4 months.
  10. 21. To ________ the amount of spam you receive, be careful who you give your email address to.
  11. 23. When creating a password do not use words from your favorite pet, team, hobby, recording artist or ________.
  12. 24. A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit.
  13. 25. _________ is software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user.
  14. 27. Protect your laptop, cell phone or any other mobile devices by treating it like _______.
  15. 28. A __________ Assessment is the process by which risks are identified and the impact of those risks determined.
  16. 30. Bin Before you throw something in the ________, ask yourself, "Is this something I would give to an unauthorized person or want to become publicly available?" (2 words)
  17. 33. Email scam or attempt to trick you into giving your password or personal information.
Down
  1. 1. A computer ______ can be considered as the modern counterpart of a paper document.
  2. 2. Also known as malicious software; any program or file that is harmful to a computer user.
  3. 3. Engineering The art of tricking or manipulating people into providing information that they normally would not provide. (2 words)
  4. 6. Passwords should always be at least this many characters long.
  5. 7. A secure password should contain at least one of these.
  6. 9. Do not send __________ information over email unless it is encrypted.
  7. 10. A software that is designed to detect and destroy computer viruses.
  8. 11. Applied to data to protect it from unauthorized use in case of theft or loss.
  9. 15. A password is stronger by using a combination of both upper and lower case ___________.
  10. 17. Use this tool to dispose of documents that contain personal or financial information.
  11. 19. Use __________ passwords for the various accounts that you may have.
  12. 22. __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
  13. 26. Do not _______ your password down or attach it to your keyword or monitor.
  14. 29. Do not __________ your password or account with anyone.
  15. 31. Never forward any _________ letter.
  16. 32. Always ___________ your computer when you leave your desk.
  17. 34. ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.