Across
- 6. Using encryption and other security technologies to protect online activities and prevent unauthorized access to sensitive information.
- 7. A common form of social engineering that involves sending fraudulent emails or messages in order to steal information or spread malware.
- 9. The practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
- 10. A mindset and set of behaviors that prioritize cybersecurity and make it a fundamental part of organizational culture.
- 11. Policies and procedures for safeguarding sensitive data and ensuring its confidentiality, integrity, and availability.
- 12. The process of identifying, assessing, and mitigating cyber risks in order to protect against cyber attacks.
Down
- 1. Tools and techniques for detecting and removing malicious software, including viruses, worms, and Trojans.
- 2. A targeted form of phishing that involves customized messages designed to deceive a specific individual or group.
- 3. Strategies for creating strong, unique passwords and protecting them from unauthorized access.
- 4. Techniques used by cybercriminals to manipulate individuals into revealing sensitive information or taking harmful actions.
- 5. Best practices for keeping digital devices and online accounts clean and secure.
- 8. Best practices for staying safe while browsing the internet, including avoiding risky websites and downloading files from trusted sources.