Across
- 1. Don’t share your user
- 3. before you throw something in the _____, ask yourself, “Is this something I would give to an unauthorized person or want it to become publicly available?
- 5. __________ is making and storing another copy of data
- 8. A _____ is a program that can sneak onto your computer – often through an email attachment – and then make copies of itself, quickly using up all available memory
- 11. the IT security Policies are uploaded on _______
- 13. Facts and statistics collected for reference or analysis.
- 14. How to safeguard the information stored in laptop; Keep it ______ , when you are not available at desk.
Down
- 2. Smishing is related to _____________
- 4. The gaining of unauthorized access to data in a system or computer is __________. Down
- 6. ________ is a scam that involves Internet fraudsters who send spam or pop-up messages to get the personal information (credit card numbers, bank account information, Social Security number, passwords, or other sensitive information) from unsuspecting victims
- 7. A _______ Password contains at least 3 of the 4 following characters: Lowercase Alpha (e.g. abc), Uppercase Alpha (e.g. ABC), Numeric (e.g. 123), Special/Non-Alphanumeric (e.g. ! $ # %)
- 9. Permitted by law is _________
- 10. Software ______ is the theft of software through illegal copying of genuine programs or through counterfeiting and distribution of imitation software products or unauthorized versions of software products.
- 12. 123456 is ___________ password
