CyberSecurity Awareness - Cyber Knowledge

1234567891011121314151617181920
Across
  1. 2. is a cybersecurity threat in which attackers use QR codes to redirect victims to malicious websites or prompt them to download harmful content.
  2. 4. email that is not wanted, email that is sent to large numbers of people and that consists mostly of advertising
  3. 6. a weakness that can be accidentally triggered or intentionally exploited
  4. 8. a software update inserted (or patched) into the code of an executable program that fixes bugs, installs new drivers
  5. 9. computer software that is provided usually for free but contains advertisements
  6. 12. a type of malicious software—or malware—that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return. Ransomware attacks can cause costly disruptions to operations and the loss of critical information and data.
  7. 13. a program that is designed to harm a computer by deleting data,
  8. 16. a string of words and characters that you type in to authenticate yourself
  9. 17. preventive cybersecurity action
  10. 18. a scam by which an email user is duped into revealing personal or confidential information which the scammer can use illicitly
  11. 19. A tailgating attack is a breach of security where an unauthorized actor gains access to a controlled area by closely following someone with legitimate access credentials.
  12. 20. a usually small self-contained and self-replicating computer program that invades computers on a network and usually performs a destructive action
Down
  1. 1. the act of obtaining or attempting to obtain sensitive information by manipulating an individual into revealing secure information
  2. 3. measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack
  3. 5. having or showing realization, perception, or knowledge
  4. 7. Employs deceptive text messages (SMS) to lure victims into sharing personal information or clicking malicious links.
  5. 10. software designed to interfere with a computer's normal functioning
  6. 11. computer software that secretly records information about the way you use your computer
  7. 14. a potential circumstance, entity or event capable of exploiting a vulnerability and causing harm
  8. 15. a secret series of numbers or letters that allows you to use a computer system
  9. 18. Personal Identifiable Information (PII) is defined as: Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect mean