CSAT Cyber Security Checkpopint

12345678910111213141516171819202122232425262728293031323334353637383940
Across
  1. 4. What you should do with all links
  2. 6. Retina scans and fingerprints
  3. 8. Spyware, ransomware, viruses, oh my!
  4. 9. This authentication needs two or more things
  5. 10. Interconnected web of computers
  6. 12. Your internet viewing app
  7. 15. BIG catch for cyber criminals
  8. 17. Last thing before the first single slash in a URL
  9. 19. Longer is Stronger
  10. 22. An SMS text phish
  11. 24. From white to red
  12. 27. Voice trickery that sounds fishy!
  13. 30. Blocks malicious connections
  14. 32. A fence provides this
  15. 33. Not the kind from the ocean
  16. 34. Verifying Identity
  17. 35. Scrambled for security
  18. 38. The new DTCC MFA process
  19. 39. Uhoh, your data has been exposed!
  20. 40. DTCC password manager
Down
  1. 1. To whom should you report suspicious messages?
  2. 2. DTCC Technology launching in July
  3. 3. Last name of our CISO
  4. 5. Triggers to make you click
  5. 7. Records your keystrokes
  6. 11. Malicious software holding data hostage
  7. 13. What you should do when you suspect a phish
  8. 14. Virtual storage in the sky
  9. 16. Don't use unsecured public ______
  10. 18. Your computer is sick
  11. 19. Suspicious email
  12. 20. Wears a black hat
  13. 21. Cyber Security ____ Office (CSRO)
  14. 23. A malicious QR Code
  15. 25. Cyber vigilance
  16. 26. You entered your login info in a fake site
  17. 28. AI-generated deception
  18. 29. Check your texts closely
  19. 31. The world's most wanted hacker
  20. 36. Used to be called SATEC
  21. 37. Artificial or Real?