Cybersecurity Risk

123456789101112131415
Across
  1. 2. Convert an item, such as data, into a code or cipher.
  2. 4. Short for malicious software
  3. 7. Software that encrypts data on someone's device until that person agrees to pay to regain access.
  4. 8. Similar to a password but uses multiple words together.
  5. 10. Legitimate of innocent-looking emails asking you to respond with personal data or to click on a link.
  6. 11. Disguising an email address or phone number to convince you that you are interacting with a trusted friend or source.
  7. 13. False or inaccurate information.
  8. 14. Acronym for Pause, Ask, Think.
  9. 15. Range of activities that guide how we manage digital data.
Down
  1. 1. Measures taken to protect computer systems.
  2. 3. Type of identity that is established by an internet user.
  3. 5. Software written to damage a computer's performance, steal, or alter data.
  4. 6. The practice of phishing using text messages
  5. 9. Type of data that can be found as part of public record.
  6. 12. Type of data that should be protected from public view.