Across
- 2. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
- 4. Something you should never share with another person.
- 10. The month in which National Cyber Security Awareness Month occurs.
- 12. When someone follows a person into a secured area without proper credentials.
- 14. Links with catchy titles that lure users into opening them.
- 15. Malware that replicates itself, so it can spread to infiltrate other computers.
- 16. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- 19. Don’t download these unless you know and have confirmed the sender.
- 21. Kids and parents should be aware of these online bullies.
- 23. Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.
Down
- 1. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms, and ransomware.
- 3. Someone who violates computer security for malicious reasons, kudos, or personal gain.
- 5. A fraudulent action similar to phishing, using SMS (text) messages rather than e-mail messages to send bait message to people.
- 6. A type of malware that locks your computer until you pay to have it unlocked.
- 7. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door.”
- 8. Stop. ____. Connect.
- 9. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
- 11. A technique used by hackers to obtain sensitive information.
- 12. You should check these regularly.
- 13. The acronym for the month of cybersecurity awareness events.
- 17. Acronym for Protected Health Information.
- 18. When a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
- 20. A personal identification number commonly associated with an ATM.
- 22. Hacking or deception that imitates another person, software program, hardware device, or computer, with the intentions of bypassing security measures.