Cybersecurity Awareness Month

1234567891011
Across
  1. 4. Personally Identifiable Information
  2. 5. ______ force is a password attack method where many passwords are submitted with the hopes of guessing the correct one
  3. 9. Type of malware that threatens to expose information unless a payment is made
  4. 10. Health Insurance Portability and Accountability Act
  5. 11. An email that tricks you into giving up your passphrase
Down
  1. 1. A weakness in a program or system that can be exploited
  2. 2. Email ______ makes it seem that an email came from someone else when it came from a scammer instead, hiding their true identity
  3. 3. CWRU classifies information as: public, internal-use, and _______
  4. 6. Install operating system security ________ regularly
  5. 7. The process of changing plain text to cipher text using an algorithm
  6. 8. A ______ and Control, or C2, server is used by an adversary to communicate with compromised systems