Security Awareness Puzzle 2015

12345678910111213141516171819202122232425262728
Across
  1. 5. 21. A password is stronger by using a combination of both upper and lower case ___________.
  2. 6. 28. ________ laws such as HIPAA are designed for the regulation of personal information about individuals which can be collected by governments and other public and private organizations.
  3. 9. 25. A software that is designed to detect and destroy computer viruses.
  4. 12. 24. The state of being free from danger or threat.
  5. 13. 13. Passwords should be _________ every 3-4 months.
  6. 14. 20. Engineering The art of tricking or manipulating people into providing information that they normally would not provide.
  7. 15. 3. __________ is a popular web search engine.
  8. 16. 15. Applied to data to protect it from unauthorized use in case of theft or loss.
  9. 17. 8. A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your sysytem and blocks communition that you don't permit.
  10. 19. 5. Use __________ passwords for the various accounts that you may have.
  11. 22. 11. To ________ the amount of spam you receive, be careful who you give your email address to.
  12. 25. 10. Never share your _________ with another person.
  13. 26. 12. Healthy email always includes a clear and specific ____________ line.
  14. 27. 6. Email scam or attempt to trick you into giving your password or personal information.
Down
  1. 1. 18. A secure password should contain at least one of these.
  2. 2. 22. Choose a password that is easy for you to ____________ but hard for someone to guess.
  3. 3. 29. Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  4. 4. 30. Also known as malicious software; any program or file that is harmful to a computer user.
  5. 7. 14. Do not send __________ information over email unless it is encrypted.
  6. 8. 27. Another word for understanding, knowledge and well-informed.
  7. 10. 16. Do not leave your laptop or computer ____________.
  8. 11. 1. Protect your laptop, cell phone or any other mobile devices by treating it like _______.
  9. 12. 26. Use this tool to dispose of documents that contain personal or financial information.
  10. 14. 7. ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.
  11. 18. 9. Desk If you have any question or concerns about an email that you receive you can send it to spam@ashevillenc.gov or contact for _______.
  12. 20. 23. A computer ______ can be considered as the modern counterpart of a paper document.
  13. 21. 19. Passwords should always be at least this many characters long.
  14. 23. 4. A collection of information that is organized so that it can easily be accessed, managed, and updated.
  15. 24. 17. __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
  16. 28. 2. A __________ is often an email that gets mailed in chain letter fashion describing some devasting, highly unlikely type of virus.