Across
- 3. A student account becomes _____________ when a cyber attacker successfully gains access into their sign-on.
- 4. In an attack, the cyber attacker will often try to perform _______ movement to maintain access through other student accounts.
- 8. A formalized guideline or baseline requirement to protect information or systems.
- 10. To provide something you know plus something you have or something you are.
- 12. A malicious social engineering tactic through email asking for the user to provide personal information or take action.
Down
- 1. An action or feature available when new software is released for your computer.
- 2. Cyber attackers will often use ___________ as a tactic to be someone they are not.
- 5. Get a strange email? Stop! _______ it!
- 6. A malicious software intended to harm your computer system.
- 7. Following the sunset of beachnet+. This Wi-Fi is now used across campus.
- 9. A malicious attack through phone text messaging.
- 11. Trainings and events centered on cybersecurity strengthen this characteristic.
