Across
- 3. Cybersecurity awareness month
- 4. Bring Your Own Device
- 10. Software demanding money to unlock personal information
- 12. An individual that is authorized to access a system
- 13. Coding used to protect sensitive data
- 15. A sequence of words used for authentication
- 16. An employee is automatically enrolled in ______ training, if our simulated phishing campaign determines employee requires further training
- 17. Weakness in a system
- 19. Unauthorized intrusion
- 20. A security process that uses an additional factor for verification is called "______-Factor Authentication"
Down
- 1. Online harrassment
- 2. Malicious "horse" software
- 4. Email protection company that notifies Buckley users when questionable emails are quarantined
- 5. Email that falsely claims to be from a legitimate source, usually with a threat or request for information
- 6. Storage for infected files
- 7. Junk email
- 8. Your digital ______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
- 9. Altered audio/video to trick users into gaining access to a system
- 11. Tech used to keep intruders out
- 14. The fraudulent practice of sending a text message impersonating the head of school in order to induce individuals to reveal personal information or purchase a gift card
- 17. A piece of software that allows a user to remain anonymous while using the internet by masking the location and encrypting traffic (infamously used to circumvent a web filter)
- 18. Outlook button used to report suspicious emails to your IT department "Phish ______ button"