Cybersecurity Awareness Month - 2022

1234567891011121314
Across
  1. 1. A person who circumvents information security, often with malicious intent
  2. 4. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
  3. 5. Malware designed to make data or hardware inaccessible to the victim until a ransom is paid.
  4. 7. Event that has been determined to have an impact on the organization prompting the need for response and recovery.
  5. 10. Fake messages from a seemingly trusted or reputable source designed to convince you to take some sort of action
  6. 11. A made-up scenario developed by threat actors for the purpose of stealing a victim's personal data
  7. 13. Data or other information which otherwise identifies an individual in a way that is reasonably likely to enable identification of a specific person (hint: abbreviation)
  8. 14. A set of instructions, data or programs used to operate computers and execute specific tasks
Down
  1. 2. Any crime which is committed electronically
  2. 3. Security process that requires more than one method of authentication from independent sources to verify the user’s identity (hint: abbreviation)
  3. 6. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
  4. 8. Someone who is deceived or cheated by the dishonesty of others
  5. 9. The computer's tangible components or delivery systems that store and run the written instructions
  6. 12. software intended to damage, disable, or give someone unauthorized access to your computer or other internet-connected device.