Across
- 1. A _______ Password contains at least 3 of the 4 following characters:Lowercase Alpha (e.g. abc), Uppercase Alpha (e.g. ABC), Numeric (e.g.123), Special/Non-Alphanumeric (e.g. ! $ # %).
- 4. Software program that may be installed on your computer without your consent to monitor your use, send pop-up ads, redirect your computer to certain websites, which could lead to identity theft.
- 6. The scrambling of data into a secret code that can be read only by software set to decode the information.
- 8. Ensuring the information is accessable only to those autorised to have access.
- 10. Its a scam that involves Internet fraudsters who send spam or pop-up messages to lure personal information from unsuspecting victims.
- 12. Virus can spread via the email feature.
- 14. Never use email for any _______ or unethical purpose.
Down
- 2. Donot share your _______ with colleagues and managers.
- 3. Safeguarding the accuracy & Completeness of Information & process method.
- 5. Ensure that authorised user have access to information & associated assets when required.
- 7. Specific categories of web sites are blocked for one or more of the following reasons.
- 9. Specific categories of web sites are blocked for one or more of the following reasons.
- 11. A type of spam that could also be considered as a type of virus.
- 13. Criminals sometimes use this programs like viruses and spyware to get into your computer. Once there, they can steal information, send spam, and commit fraud.
