Across
- 3. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnal information.
- 4. The process of taking plain text and scrambling it into an unreadable format.
- 5. Should be constructed of upper and lower case letters, numbers, and special characters.
- 7. A type of malicious software designed to block access to a computer system until a sum of money is paid.
- 8. A flaw or weakness in a computer system that could be exploited to violate the system's security.
- 10. A wireless technology standard used over short distances using short-wavelenghth UHF radio waves.
- 11. Hardware or software designed to prevent unauthorized access to or from private network.
- 12. The I in the C-I-A Triad; protection from unauthorized changes.
- 15. Verifying identity
- 16. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- 17. The address of a webpage. Check the validity of it before clicking on it.
- 18. Threatening behavior facilitated through electronic means such as texting.
- 19. A fraudalent email purportedly from a reputabld companty attempting to get personal information.
Down
- 1. A sequence of words or text used to control access to a computer; similar to a password.
- 2. A fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
- 3. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- 6. THe A in the C-I-A Triad. It ensures authorized users have access.
- 9. Facebook, Twitter, Instagram, etc. (two words)
- 13. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause distraction.
- 14. Unauthorize access to a network, information systems, or application.
