Across
- 1. Protect your laptop, cell phone or any other mobile devices by treating it like _______.
- 2. A __________ is often an email that gets mailed in chain letter fashion describing some devasting, highly unlikely type of virus.
- 6. Email scam or attempt to trick you into giving your password or personal information.
- 7. ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.
- 8. A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your sysytem and blocks communition that you don't permit.
- 9. Desk If you have any question or concerns about an email that you receive you can send it to Spam@ashevillenc.gov or contact _______ _______. (2 words)
- 11. To ________ the amount of spam you receive, be careful who you give your email address to.
- 12. Healthy email always includes a clear and specific ____________ line.
- 14. Do not send __________ information over email unless it is encrypted.
- 16. Do not leave your laptop or computer ____________.
- 18. A secure password should contain at least one of these.
- 20. Engineering The art of tricking or manipulating people into providing information that they normally would not provide. (2 words)
- 22. Choose a password that is easy for you to ____________ but hard for someone to guess.
- 23. A computer ______ can be considered as the modern counterpart of a paper document.
- 24. The state of being free from danger or threat.
- 25. When creating a password do not use words from your favorite sport, team, hobby, recording artist or ________.
- 26. Your password is like a ________; use it regularly, change it often, and do not share it with anyone else.
- 27. A software that is designed to detect and destroy computer viruses.
- 29. Another word for understanding, knowledge and well-informed.
- 31. Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
- 32. Also known as malicious software; any program or file that is harmful to a computer user.
- 36. Do not __________ your password or account with anyone.
- 37. Always ___________ your computer when you leave your desk.
Down
- 1. Never forward any _________ letter.
- 3. __________ is a popular web search engine.
- 4. A collection of information that is organized so that it can easily be accessed, managed, and updated.
- 5. Use __________ passwords for the various accounts that you may have.
- 10. Never share your _________ with another person.
- 12. _________ is software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user.
- 13. Passwords should be _________ every 3-4 months.
- 15. Applied to data to protect it from unauthorized use in case of theft or loss.
- 17. __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
- 19. Passwords should always be at least this many characters long.
- 21. A password is stronger by using a combination of both upper and lower case ___________.
- 26. Before you throw something in the ________, ask yourself, "Is this something I would give to an unauthorized person or want to become publicly available?"
- 28. Use this tool to dispose of documents that contain personal or financial information.
- 30. ________ laws such as HIPAA are designed for the regulation of personal information about individuals which can be collected by governments and other public and private organizations.
- 33. Do not _______ your password down or attach it to your keyword or monitor.
- 34. To protect personal information, avoid sending it via_________.
- 35. A __________ Assessment is the process by which risks are identified and the impact of those risks determined.
