Across
- 3. An attack using computer program to guess the correct user credentials
- 5. If you receive suspicious ____ then hover over it with your mouse before clicking to make sure it is real.
- 6. Protocol used for encryption which protects data in transit
- 8. A piece of data stored on your device by websites you visit. Not chocolate chip, though
- 11. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- 13. Spoofing is when bad actors create a fake ______ and send phish emails to imitate a business
- 14. Encryption technique used to protect data
- 15. A sequence of words or text used to control access to a computer; similar to a password.
- 16. A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket"
Down
- 1. The act of tricking someone into giving up sensitive information
- 2. System(software or hardware) used to manage network security and monitor traffic
- 4. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
- 7. Unauthorized disclosure of this category of classified information could be expected to cause damage to organisation security
- 9. Any circumstance or event with the potential to adversely impact agency operations, assets, or individuals.
- 10. This testing simulates a full stack attack, probing every possible weakness
- 12. Malicious program that can replicate itself