Across
- 1. A set of instructions written in a programming language that a computer can understand and execute.
- 6. Unwanted or unsolicited digital communication, often sent in bulk.
- 7. Software that automatically displays or downloads advertising material.
- 8. Virtual A service that encrypts your internet connection for privacy.
- 9. State A country that engages in cyber activities, often for strategic, political, or economic purposes
- 11. Software that enables unauthorized access to a computer while hiding its presence.
- 13. A person who uses computers to gain unauthorized access to data.
- 14. The mailbox you can send all your SETA inquiries to.
Down
- 2. A type of synthetic media where an image, video, or audio recording is manipulated using artificial intelligence (AI).
- 3. A secret word or phrase used to gain access to a computer system.
- 4. A network of infected computers controlled by a hacker.
- 5. Trust A security model that assumes no user or device is trusted by default.
- 7. The frequency of which you must take Cyber Security Awareness Training
- 10. A type of malware that disguises itself as a legitimate software.
- 12. Unauthorized access or compromise of a system, network, or data
- 15. Software that secretly monitors and collects information about users.
