Across
- 2. Fraudulent phone calls or voice messages purporting to be from reputable companies or a department in your own company in order to trick individuals into revealing personal information.
- 3. A sequence of words or text used to control access to a computer; similar to a password
- 5. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- 8. The process of taking plain text and scrambling it into an unreadable format.
- 9. Hardware or software designed to prevent unauthorized access to or from a private network
- 10. Fraudulent text messages pretending to be from reputable companies in order to trick individuals into revealing personal information.
- 12. A means to verify identity
- 13. The address of a webpage. Check the validity of it before clicking it.
- 15. Should be constructed of upper case and lower case letters, numbers, special characters, and at least 16 characters long.
- 16. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer.
- 17. The protection, restoration, and prevention of damage to a computer and the information contained therein to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.
Down
- 1. A type of malicious software designed to block access to a computer system until a sum of money is paid.
- 2. A flaw or weakness in a computer system, network, application, or software that could be exploited to violate the system’s security.
- 4. A fraudulent email pretending to be from a reputable person or company attempting to get your information.
- 6. Software created specifically to help detect, prevent, and remove malware (malicious software).
- 7. Security tool that creates a secure, encrypted connection between you and the internet (three letter acronym)
- 10. Facebook, Twitter, Instagram, etc. (Two words, no spaces)
- 11. A person who uses computers to gain unauthorized access to data. AKA “bad actor”
- 14. Unauthorized Access to a network, information systems, or application.