Introduction to Cybersecurity

12345678910111213141516171819
Across
  1. 1. Its job is to put a digital signature on outgoing mail so servers could actually verify that it is you sending that email.
  2. 3. Unwanted messages are usually referred to as spam.
  3. 4. It's the third tool for email authentication. DMARC verifies that this address matches the “from” address you see.
  4. 8. when a victim is bullied and harassed through electronics.
  5. 9. Policy Framework (SPF)- an email authentication method that helps to identify the mail servers that are allowed to send email for a given domain.
  6. 10. This is a part of a computer system that is utilized to block unauthorized data.
  7. 12. protection against unauthorized access
  8. 13. It is the process of converting data into a different type of form or code.
  9. 17. Its an email authentication policy that protects against bad people who use fake email addresses.
  10. 18. It is an area where computer systems and networks are utilized.
  11. 19. program is referred to as clientless if it can operate wholly over the network without needing to install any software.
Down
  1. 1. an email authentication method that uses a digital signature to let the receiver of an email know that the message was sent and authorized by the owner of a domain.
  2. 2. this is when you pass an organization’s existing security systems.
  3. 5. spoof logos and make up fake email addresses. Scammers use familiar company names or pretend to be someone you know.
  4. 6. attempt to gain unauthorized access to a computer
  5. 7. a software used as an intent to destroy or disrupt unauthorized access.
  6. 11. Wifi protected access is a security standard for computing devices.
  7. 14. insurance- Cyber insurance is one option that can help protect your business against losses resulting from a cyber attack.
  8. 15. This is when users can send and receive data using a virtual private network.
  9. 16. authentication This technology allows a receiving server to verify an email from your company and block emails from an imposter.