CyberWeek

12345678910111213141516
Across
  1. 1. The orange phish hook you can use to alert IT to spam in your email from Know Be 4
  2. 3. Email that falsely claims to be from a legitimate source, usually with a threat or request for information
  3. 5. Junk email
  4. 7. Online harassment
  5. 10. Altered audio/video to trick users into gaining access to a system
  6. 11. A type of technology used to keep intruders out
  7. 13. Cybersecurity awareness month
  8. 14. Puts the “m” in MFA
  9. 15. Coding used to protect sensitive data
  10. 16. Where do you store infected files on your computer
Down
  1. 1. A sequence of words used for authentication (hint: not a password)
  2. 2. Software that allows a user to remain anonymous while using the internet. This will mask your location and encrypting traffic.
  3. 4. cheat your way into someone’s network
  4. 6. The company FASNY uses to encrypt your email
  5. 8. Short for bring your own device
  6. 9. A malicious deep web program that holds your information hostage
  7. 12. Your digital ______ is a collection of information you leave on the internet that can’t be removed by deleting or setting it as private.