IT Security Awareness Contest

1234567891011121314151617181920
Across
  1. 1. the use of two different components to verify your identity
  2. 3. type of tolerance rkmiles has to any actions that create a hostile work environment
  3. 5. type of grammar that typically raise a red flag for phishing emails
  4. 8. the first line of defense against cyber criminals
  5. 10. what you should not let anyone do when you type in your password
  6. 14. a math function to make data only available with a key
  7. 16. malicious software that makes date or systems unusable until the victim makes a payment
  8. 18. where data can be accessed as a service
  9. 19. when you use the internet you leave this type of footprint behind
  10. 20. recently discovered vulnerabilities, not yet known to vendors or antivirus companies that hackers can exploit
Down
  1. 2. can be hardware or software
  2. 4. program that can automate task
  3. 6. mass emails sent to many people asking for sensitive information
  4. 7. virus disguised as legit software
  5. 9. type of consequence that a sender is asking from you to avoid
  6. 11. software to assist in detecting virus's
  7. 12. what you do with your mouse to see where a hyperlink will take you
  8. 13. email designed to look like it's from a person you know
  9. 15. what department should you get approval from for downloading software
  10. 17. what a password should be