Cyber Challenge Week 2

1234567891011121314151617
Across
  1. 1. Set your computer to _ _ _ _ _ _ _ _ _ _ _ _ _ check for new software updates.
  2. 4. Method of converting plain text into a code that can only be read by authorised parties.
  3. 9. Malicious software that can cause damage to systems or data
  4. 11. _ _ _ _ _ _ engineering. The use of psychological manipulation to trick people into divulging confidential information or performing actions that are not in their best interest.
  5. 12. A form of malware in which files are locked until a payment is made to the attacker
  6. 16. Malicious emails that request sensitive information or opening of attachments
  7. 17. a string of random words that are a more secure version of passwords.
Down
  1. 2. A type of software designed to protect against malware and other threats
  2. 3. Always _ _ _ _ your computer when you leave your desk.
  3. 5. A method of logon that requires you to present two or more pieces of evidence to prove your identity.
  4. 6. An update to software that fixes a vulnerability or bug.
  5. 7. Online harassment.
  6. 8. Don't click on _ _ _ _ _ within emails from an unknown or untrusted source.
  7. 10. A passwordless option for logging into devices
  8. 13. A form of phishing that targets high profile individuals
  9. 14. _ _ _ _ breach. The unauthorized access, use, or disclosure of sensitive information.
  10. 15. Errors or vulnerabilities in software