Cybersecurity Awareness Month

123456789101112
Across
  1. 2. Manages policies and practices aimed at preventing unauthorized access, data breaches, and misuse of personal data.
  2. 3. A string of unique characters used to login to a computer.
  3. 8. A sentence-like string of words used for authentication that is easy to remember but difficult to crack.
  4. 10. The practice of protecting systems, networks, and programs from digital attacks.
  5. 11. Attempting to acquire sensitive data, such as personal information or passwords, through a fraudulent solicitation in email.
  6. 12. A method to verify identity and protect computers from unauthorized use.
Down
  1. 1. Malware designed to deny a user or organization access to files on their computer.
  2. 4. Phishing method using text messages
  3. 5. A method used to defraud people over the phone.
  4. 6. To keep safe from harm.
  5. 7. A skilled programmer who secretly invades computers without authorization.
  6. 9. A type of artificial intelligence used to create convincing fake images, videos and audio recordings.