Cybersecurity Crossword Puzzle

123456789
Across
  1. 3. It is important to keep a clean desktop. You should store your files on your instead of your desktop to ensure your files are backup and protected.
  2. 4. is malicious software, or malware, that prevents you from accessing your files, systems, or netowkrs and demands you pay a ransomw for their return.
  3. 6. -factor authentication is a second layer of security that protects our networks from cyber-attack.
  4. 8. Alert Button We report phishing by using the
  5. 9. threat is when authorized access is used intentionally or unitentionally to harm Intermountain Health or any of it's subsidiary companies.
Down
  1. 1. is a combination of 'deep learning' and 'fake'.this is a synthetic media that has been digitally manipulated to replace one person's likeness convincingly with that of another.
  2. 2. Rule requires appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information.
  3. 5. such as curiosity, urgency, greed, and fear are used in phishing emails.
  4. 7. can be described as a crime employing both social engineering and technical subterfuge to steal personal and professional data.