NCPD FCU Security Awareness Puzzle
Across
- 2. Your password should be ______ for you to remember, but difficult for anyone else to guess.
- 4. Unsolicited email, which often attempts to sell a product or service is known as this.
- 10. Always check the senders name as well as the email subject before clicking on the message so you don't get _____ into opening a phishing email.
- 12. Software updates installed on your computer are known as this.
- 14. This term defines a psychological manipulation of people into performing actions or divulging confidential information.
- 15. When reviewing your email, if you don't know the sender of an email, always remember the phrase "When in doubt, throw it ____".
- 17. Never open unexpected or _______ looking emails, or click on any questionable links contained within an email.
- 18. _________ is one of the most important communication tools used in the work environment.
- 20. This term defines an attempt to acquire sensitive information such as usernames, passwords, &/or credit card #'s by masquerading as a legitimate source in an email communication.
- 21. A password that is considered to be "strong", is also known as a _______ password.
- 22. The month of ______________ is officially known as "National Cyber Security Awareness Month".
- 24. NCPD FCU's best line of defense against cyber security threats is ___.
- 26. When discarding documents containing sensitive information, it's critical that you ______ them.
- 27. The term "shoulder surfing" refers to unauthorized users attempting to view information displayed on your computer _______.
- 28. A computer ________can corrupt or delete data, use your email to spread itself to other computers, or even erase everything on 1 or more hard drives.
- 30. It's critical that you report all suspicious or unusual PC problems to the __ department ASAP.
Down
- 1. When you step _______ from your desk, always lock your computer screen to prevent outsiders from accessing your PC.
- 3. The primary goal of Cyber Security training is to promote cyber ____________.
- 4. Computer __________ should be password protected & set to automatically activate after a few minutes of mouse or keyboard inactivity.
- 5. To keep hard copies of sensitive documents confidential, remember to follow our "Clean Desk _______" & safely store these documents from unauthorized view.
- 6. Store documents containing _________ information such as account #'s, SSN#, &/or credit card #'s in a locked area when you leave your desk.
- 7. Knowing what to shred & as well as what to keep may help deter ________ theft.
- 8. Your network _________ is a form of authentication, which is used to get you logged into the network.
- 9. Use this 3 key combination to lock your PC screen each time you leave your desk: <Ctrl> <Alt> & <_________>.
- 11. When creating various passwords, it's important for you to make each password slightly _________.
- 13. It's a good practice to always _______ longer passwords for added security.
- 16. When opening email, be ever cautious of embedded ______ contained in all email messages.
- 19. A _________ is someone who seeks and exploits weaknesses in a computer system or computer network.
- 20. Be wary of accepting any ___-__ messages on your PC that appear about updating program files such as Flash or Java.
- 22. At the end of the workday, always remember to close all applications & log ___ of your computer.
- 23. Stay alert so that you don't become a ________ of cyber crime.
- 25. Several weeks ago, Yahoo confirmed that hackers had stolen data from at least 500 million of it's ________ accounts.
- 29. Employees are reminded to always remain aware in order to minimize your cyber security _____ on all work, mobile & home devices.