Cybersecurity Awareness

1234567891011121314151617181920212223242526
Across
  1. 3. Term commonly used to describe junk e-mail on the Internet
  2. 4. ________ software is designed to detect, prevent, and remove malware infections on computers and other devices
  3. 6. Malicious or harmful software designed to damage or disrupt a computer system
  4. 10. A security tool, which may be a hardware or software solution that is used to filter network traffic
  5. 11. Unauthorized intrusion
  6. 16. A type of media manipulation to trick users, where bad actors alter an image or video to create a false perception of reality
  7. 18. The process of proving an individual is a claimed identity
  8. 19. Small files which are stored on a user’s computer
  9. 20. Software demanding money to unlock personal information
  10. 22. A piece of software that allows a user to remain anonymous while using the internet by masking the location and encrypting traffic (infamously used to circumvent our web filter)
  11. 23. Bring Your Own Device
  12. 24. A network of compromised computers used to carry out cyberattacks on other systems
  13. 25. Online harassment
  14. 26. Email that falsely claims to be from a legitimate source, usually with a threat or request for information
Down
  1. 1. Storage for infected files
  2. 2. A _______ attack involves the use of multiple devices to flood a website or server with traffic, resulting in its temporary shutdown
  3. 5. malicious software that is imbedded inside of a benign host file
  4. 7. Coding used to protect sensitive data
  5. 8. Creating a duplicate copy of data onto a separate physical storage device or online/cloud storage solution
  6. 9. Tricking users into clicking on hidden elements in order to perform unwanted actions
  7. 12. Weakness in a system
  8. 13. A layered security system that requires more than one means of authentication to grant access to an account or device
  9. 14. Encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
  10. 15. Coding used to protect sensitive data
  11. 17. A sequence of words used for authentication
  12. 21. Cybersecurity awareness month