Cybersecurity Awareness Puzzle

123456789101112131415161718192021222324
Across
  1. 3. A type of cyberattack in which an attacker systematically attempts all possible combinations of passwords or encryption keys to gain unauthorized access.
  2. 5. A network security device or software that monitors and controls incoming and outgoing network traffic to protect against unauthorized access and cyber threats.
  3. 6. Malicious software designed to harm or gain unauthorized access to computer systems, including viruses, Trojans, and ransomware.
  4. 8. A form of cyberattack in which attackers impersonate trusted entities to trick individuals into disclosing sensitive information or taking malicious actions.
  5. 9. The world's greatest Flamingo
  6. 12. Unauthorized interception and monitoring of network communications, typically for the purpose of gathering sensitive information.
  7. 14. The potential for financial loss, reputation damage, or other adverse consequences resulting from cybersecurity threats,
  8. 15. A decoy system or network intentionally set up to attract and deceive cyber attackers, allowing security professionals to observe and study their activities.
  9. 18. A vulnerability or software flaw that is unknown to the software vendor and therefore has no available fix or patch, making it highly exploitable.
  10. 20. A part of the internet that is intentionally hidden and only accessible using special software, where users can browse anonymously and engage in activities that often include illegal or illicit transactions.
  11. 22. A software update or fix released by vendors to address security vulnerabilities and improve the functionality or stability of a program or system.
  12. 23. Social ___ is when individuals manipulate or deceive others, often using psychological tactics, to gain unauthorized access to information, systems, or physical spaces or to influence their actions for malicious purposes.
  13. 24. is a phishing cybersecurity attack carried out over mobile text messaging, also known as SMS phishing
Down
  1. 1. Contact the ___ ___ if you suspect malicious activity on your computer.
  2. 2. The process of converting data into a secure, unreadable format to protect it from unauthorized access or interception.
  3. 4. Malicious software that can replicate itself and infect other computer files, often causing harm by altering, corrupting, or deleting data and compromising the affected computer's operation.
  4. 7. Malicious software that encrypts a victim's files or system and demands a ransom payment in exchange for the decryption key.
  5. 9. Report Suspicious emails with the ___ ___ ___
  6. 10. A secret combination of characters, typically known only to the authorized user
  7. 11. A secure network connection that encrypts data traffic between a user's device and a remote server, providing privacy and anonymity, especially on public networks.
  8. 13. A cyber crime that uses the phone to steal personal confidential information
  9. 16. A network of interconnected physical devices, such as smart appliances and sensors, that can collect and exchange data over the internet.
  10. 17. A malicious cyber tactic that attempts to distribute malware through online advertisements.
  11. 19. Practicing cyber ___ is when you consistently follow best practices and take proactive measures to protect your digital devices, personal information, and online activities from cybersecurity threats and vulnerabilities.
  12. 21. Software designed to detect, prevent, and remove computer viruses and other malware from a computer or network.
  13. 24. Email ___ makes it seem that an email is coming from a legitimate or trusted source when, in reality, it may be sent by malicious actors with malicious intent.