Cyber Month!

12345678910
Across
  1. 2. Name of the person who knows a lot about Big Risk because he IS a Big Risk
  2. 5. A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in electronic communication.
  3. 6. Animal you played during last week's Knowbe4 training
  4. 7. Password storing software available to CAMPUS employees
  5. 8. it refers to any software specifically designed to harm, disrupt, or gain unauthorized access to computer systems or data.
  6. 10. Clearly the best type of ice cream, don't argue
Down
  1. 1. The process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can decipher and read it.
  2. 3. The process of verifying the identity of a user, system, or application to ensure that access is granted only to authorized individuals or entities.
  3. 4. A security system designed to protect a network or computer from unauthorized access by monitoring and controlling incoming and outgoing network traffic.
  4. 9. secret combination of characters, numbers, or symbols that you use to access something