Cybersecurity Crossword

123456789101112131415161718
Across
  1. 1. Security tool that creates a secure, encrypted connection between you and the Internet (acronym)
  2. 2. Hardware or software designed to prevent unauthorized access to or from a private network.
  3. 3. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  4. 4. Should be constructed of upper and lower case letters, numbers, and special characters.
  5. 6. The address of a webpage. Check the validity of it before clicking on it.
  6. 8. Unauthorized access to a network, information systems, or application.
  7. 10. A sequence of words or text used to control access to a computer; similar to a password.
  8. 11. The process of taking plain text and scrambling it into an unreadable format.
  9. 12. Threatening behavior facilitated through electronic means such as texting.
  10. 15. MEDIA Facebook, Twitter, Instagram, etc. (Two words)
  11. 16. Verifying identity.
  12. 17. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
  13. 18. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
Down
  1. 1. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  2. 4. A fraudulent email purportedly from a reputable company attempting to get personal information.
  3. 5. 1. A wireless technology standard used over short distances using short-wavelength UHF radio waves.
  4. 7. The “A” in the C-I-A Triad. It ensures authorized users have access.
  5. 9. The “I” in the C-I-A Triad; protection from unauthorized changes.
  6. 13. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  7. 14. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.