Chapter 8: Cybersecurity Vocab Crossword

123456789101112131415161718192021
Across
  1. 3. Update: phishing attack where the hacker sends a message regarding the restart or deactivation of your membership.
  2. 6. a type of malware that gains access to your operating system, then locks you out of your own system, holding your own computer ransom until you pay for its release.
  3. 9. Activity: phishing attack where the hacker sends a message regarding your account being locked out or unusual sign ins.
  4. 11. Money Phish: phishing track where the hacker sends a message regarding some unearned money being given to you.
  5. 13. Phish: phishing attack where the hacker sends a message for you to log back into your account.
  6. 14. SMS phishing text messages asking you to click here.
  7. 18. Before You Click’: Money Vehicle’s 5 Cyber security questions to ask yourself as you receive messages today, no matter if it looks like a known source or not.
  8. 20. a system designed to block unauthorized access while still allowing outward communication.
  9. 21. Funny Mirror: the lens people see the world of social media through, never a clear picture but always warped into how the content creator wants you to see the
Down
  1. 1. a secret phrase used to gain admission into something.
  2. 2. voicemail messages demanding you to take action.
  3. 3. software that is designed to disrupt, damage, or gain unauthorized access to a computer.
  4. 4. creating a story based on bits of information that the attacker has gathered to earn trust and manipulate an individual to share personal information.
  5. 5. The Hackers: Money Vehicle’s approach to defending yourself in the online cyber war.
  6. 7. Drive: a data storage device that can be used even when the device is turned off.
  7. 8. Cloud: a data storage device that is stored on the internet
  8. 10. Software: a program designed to detect and remove viruses and other malware from your computer.
  9. 12. every aspect of your defense to fight the hackers.
  10. 14. Password: an unpredictable password made up of eight (8) or more characters and using a combination of uppercase letters, lowercase letters, symbols, and numbers
  11. 15. Engineering: the use of deception to manipulate an individual into giving personal information away.
  12. 16. Phish: phishing attack where the hacker sends a message regarding a package being delivered.
  13. 17. sending fraudulent messages that imitate a real company in hope of being given personal information.
  14. 19. Horse: Leaving a piece of infected hardware, like a USB drive, some place public and waiting for someone to pick it up and try to use it, providing access to your system.