CYBERSECURITY CROSSWORD CHALLENGE

12345678910111213141516
Across
  1. 3. If you receive suspicious ____ then hover over it with your mouse before clicking to make sure it is real.
  2. 5. Encryption technique used to protect data
  3. 7. A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket"
  4. 8. Any circumstance or event with the potential to adversely impact agency operations, assets, or individuals.
  5. 10. A sequence of words or text used to control access to a computer; similar to a password.
  6. 12. System(software or hardware) used to manage network security and monitor traffic
  7. 13. Malicious program that can replicate itself
  8. 15. An attack using computer program to guess the correct user credentials
  9. 16. This testing simulates a full stack attack, probing every possible weakness
Down
  1. 1. Unauthorized disclosure of this category of classified information could be expected to cause damage to organisation security
  2. 2. Protocol used for encryption which protects data in transit
  3. 4. Spoofing is when bad actors create a fake ______ and send phish emails to imitate a business
  4. 6. The act of tricking someone into giving up sensitive information
  5. 9. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  6. 11. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  7. 14. A piece of data stored on your device by websites you visit. Not chocolate chip, though