Cybersecurity Awareness

1234567891011121314151617181920
Across
  1. 3. Cybersecurity awareness month
  2. 4. Bring Your Own Device
  3. 10. Software demanding money to unlock personal information
  4. 12. An individual that is authorized to access a system
  5. 13. Coding used to protect sensitive data
  6. 15. A sequence of words used for authentication
  7. 16. An employee is automatically enrolled in ______ training, if our simulated phishing campaign determines employee requires further training
  8. 17. Weakness in a system
  9. 19. Unauthorized intrusion
  10. 20. A security process that uses an additional factor for verification is called "______-Factor Authentication"
Down
  1. 1. Online harrassment
  2. 2. Malicious "horse" software
  3. 4. Email protection company that notifies Buckley users when questionable emails are quarantined
  4. 5. Email that falsely claims to be from a legitimate source, usually with a threat or request for information
  5. 6. Storage for infected files
  6. 7. Junk email
  7. 8. Your digital ______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
  8. 9. Altered audio/video to trick users into gaining access to a system
  9. 11. Tech used to keep intruders out
  10. 14. The fraudulent practice of sending a text message impersonating the head of school in order to induce individuals to reveal personal information or purchase a gift card
  11. 17. A piece of software that allows a user to remain anonymous while using the internet by masking the location and encrypting traffic (infamously used to circumvent a web filter)
  12. 18. Outlook button used to report suspicious emails to your IT department "Phish ______ button"