Security Awareness

12345678910111213141516171819202122232425262728293031
Across
  1. 1. Cleartext data that is to be encrypted and decrypted by a cryptographic algorithm
  2. 2. Spam that uses graphical images of text in order to circumvent text-based filters
  3. 4. An email client feature that allows the user to read an email message without actually opening it
  4. 6. A set of security standards that all U>S> companies processing, storing , or transmitting credit card information must follow
  5. 8. Cryptographic algorithms that use a single key to encrypt and decrypt a message
  6. 10. An earlier email protocol for handling incoming mail
  7. 12. Cryptography that uses two mathematically related keys
  8. 15. A publicly released software security update intended to repair a vulnerability
  9. 17. A global network that allows devices connected to it to exchange information
  10. 19. A more recent and advanced email protocol
  11. 21. Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  12. 23. The process of proving that a user performed an action
  13. 26. The ability to remotely erase data stored on a mobile device
  14. 27. A false warning intended to trick a user into performing an action that will compromise security
  15. 28. An asymmetric encryption key that does not have to protected
  16. 31. Security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data
Down
  1. 1. An asymmetric encryption key that does have to be protected
  2. 3. Malware that prevents a user's device from properly operating until a fee is paid
  3. 5. A web browser addition that adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser that normally it could not play or display
  4. 6. One of several types of tools for securing passwords, including password generators, online vaults, and password management application
  5. 7. A language that allows web authors to combine text, graphic images, audio, and video into a single document
  6. 9. Malware that can trigger arbitrary code execution from one computer to a second computer over a network or the internet
  7. 11. Stealing another person's personal information, such as a social security number, and then using the information to impersonate the victim, generally for financial gain
  8. 13. A situation that involves exposure to danger
  9. 14. Software that runs as a program on the local computer to block or filter traffic coming into and out of the computer
  10. 15. A Microsoft Office function that automatically opens documents attached to emails in a read-only mode that disables editing functions
  11. 16. The most recent version of html that standardizes sound and video formats
  12. 18. A secret combination of letters, numbers, and/or symbols that serves to authenticate a user by what he or she knows
  13. 19. The tasks of protecting the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures
  14. 20. A U.S. law designed to fight corporate corruption
  15. 22. The most widely known and influential organization in the field of computer networking and wireless communications
  16. 24. A set of software tools used by an attacker to hide the actions or presence of other types of malicious software
  17. 25. Creating an invented scenario to persuade the victim to perform an action or provide confidential information
  18. 26. Removing the built-in limitations and protections on Google Android devices
  19. 29. Employees, contractors, and business partners who can be responsible for an attack
  20. 30. The state or condition of being free from public attention to the degree that the user chooses