Security Lingo

123456789101112
Across
  1. 2. When a cyber criminal sends fake emails or links to gather information or spread malware.
  2. 6. When someone gains access to an area they aren't supposed to be in by following behind other people.
  3. 10. A type of malware that locks or exposes your information unless you pay a ransom.
  4. 11. A security system designed to monitor and prevent unauthorized access to a network.
  5. 12. When an attacker tries to get you to reveal information over the phone.
Down
  1. 1. The process of converting data to an unrecognizable format so only authorized people can access it, similar to a secret code.
  2. 3. A flaw in software or a system that that leaves it open to cyber attack.
  3. 4. Manipulating caller ID or an email address to make a call or email look like it's coming from someone else.
  4. 5. Stronger than a typical password, this is a sentence that can include any combination of characters, punctuation, and spaces.
  5. 7. A type of phishing that targets the "big fish", such as senior leaders or other high profile individuals.
  6. 8. Software that is designed to do damage or perform unwanted actions on a computer system.
  7. 9. A type of malware that secretly tracks your keystrokes.