Cybersecurity Awareness Month

1234567891011121314151617181920
Across
  1. 3. When sensitive information is exposed after a security failure, it’s a data ______.
  2. 5. Always ______ your software to the latest version to fix bugs and stay secure!
  3. 10. Always use a password _______ to store and organize your passwords safely!
  4. 11. Bad software installed on a computer to damage or harm it. Examples include viruses, worms, trojans, spyware, ransomware, etc.
  5. 12. __________ is a type of malware that locks your files and demands payment to unlock them.
  6. 14. When malicious threat actors disguise themselves as a trusted source to deceive you, it's called ________.
  7. 15. Technology that scrambles your data so it can only be read by those authorized is called __________.
  8. 19. When malicious threat actors create a fake email or website to trick you it is called ________.
  9. 20. Technology that enables machines to mimic human intelligence, learning, and decision-making is known as __.
Down
  1. 1. When hackers pretend to be a trusted entity to manipulate you into giving up sensitive information or access unauthorized systems, it’s called ______ engineering.
  2. 2. A fake video, image, or audio created using AI to impersonate someone is known as a ________.
  3. 4. A ________ is a security system that blocks unauthorized access to your computer or network.
  4. 6. Always use long and unique _________ for each of your accounts.
  5. 7. Leaving a tempting item, like a free download or USB, to trick people into installing malware is called _______.
  6. 8. If you receive a strange text message asking for personal info, it might be ________ (SMS Phishing).
  7. 9. When bad threat actors use a QR code to trick you into visiting a malicious site, it’s called ________.
  8. 13. Multi-factor Authentication, or ___, helps protect your account by adding another layer of security.
  9. 16. Open source ____________ is when cybercriminals exploit publicly available information to build a profile about a target.
  10. 17. A phone call that tricks you into sharing personal information is a form of voice phishing called _______.
  11. 18. A ___ is a private network that makes your internet activity anonymous (abbreviation).