Across
- 1. Your ____ is like your underwear; don't share it with your friends, and change it often.
- 4. Personal Identifiable Information
- 5. _________ software helps prevent and eliminate viruses and other malware from infecting your computer.
- 8. ______ force is a password attack method where many passwords are submitted with the hopes of guessing the correct one.
- 10. A distinct subset of the internet with addresses sharing a common suffix or under the control of a particular organization or individual.
- 12. A weakness in a program or system that can be exploited
- 13. A layered approach to securing data and applications where a system requires a user to present a combination of two or more credentials to verify a user's login
- 14. The process of changing plain text to cipher text using an algorithm
- 16. Logical or physical device used to filter network traffic
Down
- 2. Email _____ makes it seem that an email came from someone else when it came from a scammer instead, hiding their true identity.
- 3. United States Federal Agency that specializes in cybersecurity
- 6. National Institute of Standards and Technology
- 7. The form of malware that encrypted Colonial Pipeline files in 2021.
- 9. An email that tricks you into giving up your passphrase, password or clicking on a malicious link
- 11. Cyber Security Awareness Month
- 12. A Virtual Private Network connection that establishes a secure connection between you and the internet.
- 13. Malicious software or commands that take advantage of a system’s vulnerabilities. Common forms include: viruses, trojans, worms and ransomware
- 15. Similar to a password except you use a string of words and it gives you access to your computer.