Across
- 4. A security technique that adds an extra step and requires users to enter more information than just a password (abbreviation)
- 5. A video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously
- 9. The process of taking plain text and scrambling it into a code that is in an unreadable format
- 12. Sending unwanted bulk messages to a large number of recipients, often commercial in nature without consent of the recipients
- 14. A software designed to detect and destroy computer viruses
- 15. A part of a computer system or network which is designed to block unauthorized access while permitting outward communication
- 16. Email sent trying to get user to click on a malicious link
- 17. Following someone through physical security without using your own badge
- 18. Harmful computer programs such as viruses, worm, and trojans used by hackers to gain access to your computer and cause destructions
- 20. Fraudulent text messages that try and get information (or youtube gift cards) from you
- 21. Malicious software that intends to block access to a computer or server until an amount of money is paid
Down
- 1. Copies of critical data should be maintained in the event of catastrophic system failure
- 2. A flaw or weakness in a computer system that can be exploited
- 3. Should be constructed of a long string of upper and lower case letters, numbers, and special characters, and not used more than one place
- 6. Social ______ is the name of the cybersecurity threat where nefarious actors trick others into revealing sensitive information.
- 7. Where to find our policies
- 8. The address of a webpage. Check that it is valid before clicking on it (abbreviation)
- 10. Information (typically electronic) that can identify a particularly individual, such as name, email, address (abbreviation)
- 11. Security tool that creates a secure, encrypted connection between you and the internet (abbreviation)
- 13. The process of verifying the identity of a user
- 19. An individual who uses technology to try and gain unauthorized access to systems/networks to commit crimes