Across
- 1. Be careful connecting to public _____.
- 7. is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system
- 8. unsolicited usually commercial messages (such as e-mails or text messages) sent to a large number of recipients
- 10. shorthand for malicious software. It is software developed by cyber attackers with the intention of gaining access or causing damage to a computer or network
- 11. What month is National Cyber Security Awareness Month?
- 12. True/False: Call I.T. Service desk right away when you suspect a phishing email
Down
- 2. is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rule
- 3. techniques of protecting computers, networks, programs and data from unauthorized access or attacks
- 4. a secret word or expression used by authorized persons to prove their right to access, information, etc.
- 5. when a scammer uses fraudulent emails or texts, or copycat websites to get you to share valuable personal information
- 6. type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access
- 9. is designed to spread from host to host and has the ability to replicate itself, through a file or document, without permission or knowledge of the user