2019 – NCSAM Cyber Security Crossword Puzzle Challenge

1234567891011121314151617181920212223
Across
  1. 2. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
  2. 4. Something you should never share with another person.
  3. 10. The month in which National Cyber Security Awareness Month occurs.
  4. 12. When someone follows a person into a secured area without proper credentials.
  5. 14. Links with catchy titles that lure users into opening them.
  6. 15. Malware that replicates itself, so it can spread to infiltrate other computers.
  7. 16. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  8. 19. Don’t download these unless you know and have confirmed the sender.
  9. 21. Kids and parents should be aware of these online bullies.
  10. 23. Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.
Down
  1. 1. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms, and ransomware.
  2. 3. Someone who violates computer security for malicious reasons, kudos, or personal gain.
  3. 5. A fraudulent action similar to phishing, using SMS (text) messages rather than e-mail messages to send bait message to people.
  4. 6. A type of malware that locks your computer until you pay to have it unlocked.
  5. 7. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door.”
  6. 8. Stop. ____. Connect.
  7. 9. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
  8. 11. A technique used by hackers to obtain sensitive information.
  9. 12. You should check these regularly.
  10. 13. The acronym for the month of cybersecurity awareness events.
  11. 17. Acronym for Protected Health Information.
  12. 18. When a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
  13. 20. A personal identification number commonly associated with an ATM.
  14. 22. Hacking or deception that imitates another person, software program, hardware device, or computer, with the intentions of bypassing security measures.