Securing Computing Devices (IT crossword exercise)

123456789101112131415
Across
  1. 2. Can be started by a person who is fraudulently representing himself or herself or an institution
  2. 9. A scam designed to convince users to give up important information or money for an interesting offer.
  3. 10. Having a good ___________ program installed and running prevents most of these types of attacks from affecting you, your files, and your computer.
  4. 11. Social engineering attacks can be prevented with effective user __________
  5. 12. attack is the simplest type of password attack and involves an individual making repeated attempts to guess a password by entering different common password values, such as the user's name, a spouse's name, or a significant date.
  6. 14. Piece of code that spreads from one computer to another by attaching itself to other files
  7. 15. A term that always represents a malicious system intruder.
Down
  1. 1. A hacker who discovers and exposes security vulnerabilities for financial gain or for some malicious purpose
  2. 3. You can install software and __________ the information on all of these portable devices to make it more difficult for the thieves to access the information contained on the devices.
  3. 4. In a __________ attack, the attacker sends an email that seems to come from a respected bank or other financial institution.
  4. 5. Human-based or software-based attack where the goal is to pretend to be someone else for the purpose of identity concealment.
  5. 6. By properly disposing of paper and hardware, you can protect your organization from ___________ divers.
  6. 7. Any unwanted software that has the potential to damage a system, impede performance, or create a nuisance condition.
  7. 8. A security threat that can destroy hardware and therefore the data contained in it
  8. 13. Email-based threat that presents various advertising materials, promotional content, or get-rich-quick schemes to users.