Cyber Security Awareness

12345678910111213141516171819202122
Across
  1. 2. A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite.
  2. 6. The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment.
  3. 10. Something that shows up in an email.
  4. 13. Threats Malware is defined as any device.
  5. 15. An attempt by hackers to damage or destroy a computer network or system.
  6. 16. A security tool, which may be a hardware or software solution that is used to filter network traffic.
  7. 19. Identity and Privacy Protection.
  8. 21. Someone attempting to create Identity fraud.
  9. 22. The act of falsifying the identity of the source of a communication or interaction.
Down
  1. 1. Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system.
  2. 3. Shield The ultimate call control center that gives customers full control of all T-Mobile's scam protection options.
  3. 4. A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software.
  4. 5. a dishonest scheme; a fraud.
  5. 7. A form of malware that monitors user activities and reports them to an external their party.
  6. 8. The likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization.
  7. 9. Hard to detect both by Users.
  8. 11. The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization.
  9. 12. An attack focusing on people rather than technology.
  10. 14. A specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats.
  11. 17. A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual.
  12. 18. Alerts used as a warning of danger.
  13. 20. A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP.