Across
- 2. A __________________ is any unauthorized attempt to access, disrupt, steal or damage computer systems, networks, or data.
- 4. The best way to keep Cornerstone secure is to become a ________ ___________.
- 6. All customer and bank information that is no longer required must be ____________.
- 8. an image or recording that has been convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said
- 10. A _____ _______ is a security incident where unauthorized parties access sensitive or confidential information.
- 11. Malicious software designed to harm, exploit or otherwise compromise a computer system.
- 13. the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data.
- 15. Files containing sensitive information that are transferred in any way across the Internet must be encrypted and sent ___________.
- 16. Be sure to properly _____ ______ or lock your computer screens when leaving your work area.
- 17. A technique used to deceive individuals into providing sensitive information by masquerading as a trustworthy entity in electronic communications.
- 18. Create strong ___________ or passphrases and never share them with anyone else.
Down
- 1. A type of malware that encrypts a victim's files and demands payment for the decryption key.
- 3. the process of creating a synthetic replica of a person's voice using artificial intelligence and machine learning techniques.
- 5. Follow that Bank's ___ ________ for guidance regarding the use of artificial intelligence at the Bank.
- 7. Someone who tries to access data that they aren't authorized to view.
- 9. All customer and bank information must be _______ in designated storage areas during non-business hours as well as during business hours when not required for extended periods.
- 12. ____________ suspicious activity and security incidents plays a vital role in safeguarding the Bank.
- 14. The process of verifying the identity of a user or system, often through passwords, biometrics, or security tokens.
