Cybersecurity Awareness Puzzle

12345678910111213141516171819202122
Across
  1. 3. An event or occurrence, often unexpected or problematic.
  2. 5. Hidden programs providing remote access.
  3. 10. Business Email Compromise, impersonating executives, vendors, or partners to steal funds or sensitive info.
  4. 11. More than one kind of proof.
  5. 12. Special access or rights given to certain users.
  6. 13. Self-replicating malware spreading across systems.
  7. 14. Encrypts data and demands payment for decryption.
  8. 16. You should do this to all of your software.
  9. 19. Voice (phone-based) phishing.
  10. 20. SMS/text-based phishing.
  11. 22. Security Awareness Training is provided ___.
Down
  1. 1. Proof of who someone is.
  2. 2. Permission to access a system, file, or resource.
  3. 4. A modification or update to a system, process, or configuration.
  4. 6. Protection against threats or attacks on computer and data.
  5. 7. Using someone else's access without permission to enter a building.
  6. 8. Records everything you type on a keyboard.
  7. 9. A system that blocks unauthorized access to a network or computer.
  8. 15. Cheating someone out of Money or personal Information
  9. 17. Deceptive emails that trick users into clicking malicious links or sharing credentials.
  10. 18. Secret words or codes used to unlock accounts.
  11. 21. Copying data to keep it safe in case something is lost or damaged.