Security Awareness Effectiveness

1234567891011121314
Across
  1. 1. Don’t share your user
  2. 3. before you throw something in the _____, ask yourself, “Is this something I would give to an unauthorized person or want it to become publicly available?
  3. 5. __________ is making and storing another copy of data
  4. 8. A _____ is a program that can sneak onto your computer – often through an email attachment – and then make copies of itself, quickly using up all available memory
  5. 11. the IT security Policies are uploaded on _______
  6. 13. Facts and statistics collected for reference or analysis.
  7. 14. How to safeguard the information stored in laptop; Keep it ______ , when you are not available at desk.
Down
  1. 2. Smishing is related to _____________
  2. 4. The gaining of unauthorized access to data in a system or computer is __________. Down
  3. 6. ________ is a scam that involves Internet fraudsters who send spam or pop-up messages to get the personal information (credit card numbers, bank account information, Social Security number, passwords, or other sensitive information) from unsuspecting victims
  4. 7. A _______ Password contains at least 3 of the 4 following characters: Lowercase Alpha (e.g. abc), Uppercase Alpha (e.g. ABC), Numeric (e.g. 123), Special/Non-Alphanumeric (e.g. ! $ # %)
  5. 9. Permitted by law is _________
  6. 10. Software ______ is the theft of software through illegal copying of genuine programs or through counterfeiting and distribution of imitation software products or unauthorized versions of software products.
  7. 12. 123456 is ___________ password