Across
- 3. It is important to keep a clean desktop. You should store your files on your instead of your desktop to ensure your files are backup and protected.
- 4. is malicious software, or malware, that prevents you from accessing your files, systems, or netowkrs and demands you pay a ransomw for their return.
- 6. -factor authentication is a second layer of security that protects our networks from cyber-attack.
- 8. Alert Button We report phishing by using the
- 9. threat is when authorized access is used intentionally or unitentionally to harm Intermountain Health or any of it's subsidiary companies.
Down
- 1. is a combination of 'deep learning' and 'fake'.this is a synthetic media that has been digitally manipulated to replace one person's likeness convincingly with that of another.
- 2. Rule requires appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information.
- 5. such as curiosity, urgency, greed, and fear are used in phishing emails.
- 7. can be described as a crime employing both social engineering and technical subterfuge to steal personal and professional data.