Cyber Security Awareness 2022

1234567891011121314151617181920212223242526
Across
  1. 2. A means of isolating applications, code or entire operating systems in order to perform testing or evaluation
  2. 6. A security mechanism prohibiting the execution of any program that is not on a pre-approved list of software
  3. 8. The recovery of data following computer failure or loss
  4. 9. Another kind of malware that allows cybercriminals to remotely control your computer
  5. 13. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element
  6. 16. Malware that passes information about a computer user’s activities to an external party
  7. 18. Obtaining services by using someone else’s resources
  8. 19. A device or software designed to prevent unauthorized access to a computer or network
  9. 22. A term related to the malicious concept of a botnet
  10. 23. A malicious application or script that can be used to take advantage of a computer’s vulnerability
  11. 24. Any means by which the keystrokes of a victim are recorded as they are typed into the physical keyboard
  12. 26. high-speed internet access
Down
  1. 1. A flaw or weakness that can be used to attack a system or organization
  2. 3. Computer that provides data or services to other computers over a network
  3. 4. An app on your phone that generates a code to add an extra level of security to a password
  4. 5. The proper term to refer to an unauthorized attacker of computers, networks, and technology instead of the misused term “hacker”
  5. 7. A person who has knowledge and skill in analyzing program code or a computer system, modifying its functions or operations and altering its abilities and capabilities
  6. 10. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage
  7. 11. Malware that is loaded onto a computer and then run without the user’s knowledge or knowledge of its full effect
  8. 12. Method used by criminals to obtain financial or other confidential information
  9. 14. It's not really a _____, it's just someone else's computer
  10. 15. This should be at least 8 characters long
  11. 17. The application of mathematical processes on data-at-rest and data-in-transit to provide the security benefits of confidentiality, authentication, integrity and non-repudiation
  12. 20. Something of value to a person, business, or organization
  13. 21. Something that could cause an organization not to meet one of its objectives
  14. 25. Malware that replicates itself so it can spread to infiltrate other computers