CSAM 2022 - Be Cyber Smart

12345678910111213141516171819
Across
  1. 3. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnal information.
  2. 4. The process of taking plain text and scrambling it into an unreadable format.
  3. 5. Should be constructed of upper and lower case letters, numbers, and special characters.
  4. 7. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  5. 8. A flaw or weakness in a computer system that could be exploited to violate the system's security.
  6. 10. A wireless technology standard used over short distances using short-wavelenghth UHF radio waves.
  7. 11. Hardware or software designed to prevent unauthorized access to or from private network.
  8. 12. The I in the C-I-A Triad; protection from unauthorized changes.
  9. 15. Verifying identity
  10. 16. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  11. 17. The address of a webpage. Check the validity of it before clicking on it.
  12. 18. Threatening behavior facilitated through electronic means such as texting.
  13. 19. A fraudalent email purportedly from a reputabld companty attempting to get personal information.
Down
  1. 1. A sequence of words or text used to control access to a computer; similar to a password.
  2. 2. A fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
  3. 3. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  4. 6. THe A in the C-I-A Triad. It ensures authorized users have access.
  5. 9. Facebook, Twitter, Instagram, etc. (two words)
  6. 13. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause distraction.
  7. 14. Unauthorize access to a network, information systems, or application.