Cyber Awareness Month Puzzle

12345678910111213141516
Across
  1. 2. The “I” in the C-I-A Triad; protection from unauthorized changes.
  2. 8. A fraudulent email purportedly from a reputable company attempting to get personal information.
  3. 10. Facebook, Twitter, Instagram, etc. (Two words)
  4. 11. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  5. 12. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  6. 13. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  7. 14. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  8. 16. The process of taking plain text and scrambling it into an unreadable format.
Down
  1. 1. Verifying identity.
  2. 3. The “A” in the C-I-A Triad. It ensures authorized users have access.
  3. 4. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  4. 5. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
  5. 6. Should be constructed of upper and lower case letters, numbers, and special characters.
  6. 7. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
  7. 9. Unauthorized access to a network, information systems, or application.
  8. 15. The address of a webpage. Check the validity of it before clicking on it.