Cyber Security

12345678910111213141516171819202122232425262728
Across
  1. 4. Set your computer to _ _ _ _ _ _ _ _ _ _ _ _ _ check for new software updates
  2. 5. Chief Information Security Officer
  3. 6. To protect personal information, avoid sending it via
  4. 10. Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
  5. 14. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
  6. 15. Hardware and/or software mechanisms to prevent unauthorized users from accessing a computer network
  7. 16. A malicious program designed to record which keys are pressed on a computer keyboard
  8. 19. _ _ _ _ _ _ engineering refers to the methods attackers use to manipulate people into sharing sensitive information
  9. 21. Never post private and confidential _ _ _ _ _ _ _ _ _ _ _ such as your username or password
  10. 22. Unwanted advertising that comes to your email address
  11. 23. Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
  12. 25. An unauthorized person seeking to maliciously disrupt or damage a computer
  13. 26. a string of words that must be used to gain access to a computer system or service
  14. 27. The assurance that the confidentiality of, and access to, certain information about an entity is protected
  15. 28. An Internet scam that targets unsuspecting users through email
Down
  1. 1. A technology that allows us to access our files and/or services through the internet from anywhere in the world
  2. 2. Always _______your computer when you leave your desk
  3. 3. Small files that Web sites put on your computer hard disk drive when you first visit
  4. 5. Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use
  5. 7. Domino's is known for selling
  6. 8. Malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim’s data
  7. 9. Global system of interconnected computer networks that use the Internet protocol suite
  8. 11. media websites and applications that enable users to create and share content or to participate in social networking
  9. 12. An acronym that stands for distributed denial of service – a form of cyber attack
  10. 13. A body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
  11. 14. A characteristic or specific weakness that renders an organization or asset open to exploitation.
  12. 17. Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
  13. 18. An attempt by hackers to damage or destroy a computer network or system
  14. 20. A type of malware designed to block access to a computer system or data until a sum of money is paid
  15. 24. A system invented by Google that uses a test to establish if a user is a human or a robot
  16. 27. A regular system update that is designed to cover security blunders that have been discovered