Across
- 2. Malware that demands money
- 6. Sending emails or other messages purporting to be from a reputable source
- 7. Cybersecurity Awareness Month
- 9. Secret string of characters needed to access secure sites, devices, and systems
- 10. Unauthorized data access or exfiltration
- 15. Process of confirming your identity
- 16. Blocks network intruders
Down
- 1. Person who breaks into software/systems
- 3. Cybersecurity mascot for The Plans
- 4. Button for suspicious emails (two words)
- 5. Creates a secure connection to another online network (we use this when working remotely)
- 8. Process of securing data by scrambling it
- 11. Software that protects against malicious code
- 12. Harmful software
- 13. Update that fixes a vulnerability
- 14. Training and phishing simulation partner (two words)
