NCPD FCU Security Awareness Puzzle

123456789101112131415161718192021222324252627282930
Across
  1. 2. Your password should be ______ for you to remember, but difficult for anyone else to guess.
  2. 4. Unsolicited email, which often attempts to sell a product or service is known as this.
  3. 10. Always check the senders name as well as the email subject before clicking on the message so you don't get _____ into opening a phishing email.
  4. 12. Software updates installed on your computer are known as this.
  5. 14. This term defines a psychological manipulation of people into performing actions or divulging confidential information.
  6. 15. When reviewing your email, if you don't know the sender of an email, always remember the phrase "When in doubt, throw it ____".
  7. 17. Never open unexpected or _______ looking emails, or click on any questionable links contained within an email.
  8. 18. _________ is one of the most important communication tools used in the work environment.
  9. 20. This term defines an attempt to acquire sensitive information such as usernames, passwords, &/or credit card #'s by masquerading as a legitimate source in an email communication.
  10. 21. A password that is considered to be "strong", is also known as a _______ password.
  11. 22. The month of ______________ is officially known as "National Cyber Security Awareness Month".
  12. 24. NCPD FCU's best line of defense against cyber security threats is ___.
  13. 26. When discarding documents containing sensitive information, it's critical that you ______ them.
  14. 27. The term "shoulder surfing" refers to unauthorized users attempting to view information displayed on your computer _______.
  15. 28. A computer ________can corrupt or delete data, use your email to spread itself to other computers, or even erase everything on 1 or more hard drives.
  16. 30. It's critical that you report all suspicious or unusual PC problems to the __ department ASAP.
Down
  1. 1. When you step _______ from your desk, always lock your computer screen to prevent outsiders from accessing your PC.
  2. 3. The primary goal of Cyber Security training is to promote cyber ____________.
  3. 4. Computer __________ should be password protected & set to automatically activate after a few minutes of mouse or keyboard inactivity.
  4. 5. To keep hard copies of sensitive documents confidential, remember to follow our "Clean Desk _______" & safely store these documents from unauthorized view.
  5. 6. Store documents containing _________ information such as account #'s, SSN#, &/or credit card #'s in a locked area when you leave your desk.
  6. 7. Knowing what to shred & as well as what to keep may help deter ________ theft.
  7. 8. Your network _________ is a form of authentication, which is used to get you logged into the network.
  8. 9. Use this 3 key combination to lock your PC screen each time you leave your desk: <Ctrl> <Alt> & <_________>.
  9. 11. When creating various passwords, it's important for you to make each password slightly _________.
  10. 13. It's a good practice to always _______ longer passwords for added security.
  11. 16. When opening email, be ever cautious of embedded ______ contained in all email messages.
  12. 19. A _________ is someone who seeks and exploits weaknesses in a computer system or computer network.
  13. 20. Be wary of accepting any ___-__ messages on your PC that appear about updating program files such as Flash or Java.
  14. 22. At the end of the workday, always remember to close all applications & log ___ of your computer.
  15. 23. Stay alert so that you don't become a ________ of cyber crime.
  16. 25. Several weeks ago, Yahoo confirmed that hackers had stolen data from at least 500 million of it's ________ accounts.
  17. 29. Employees are reminded to always remain aware in order to minimize your cyber security _____ on all work, mobile & home devices.