Across
- 2. This horse can stampede your security defences for the bad guys and make you look sheepish too!
- 3. Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
- 4. A program that prevents, detects, and removes viruses or other malware from a computer system.
- 5. It should be changed immediately if suspected of being compromised .
- 7. _______ your data regularly and periodically check that you are able to restore them.
- 8. If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
- 10. Do not provide your _______ email account to social networks.
- 11. displays annoying pop-ups to generate revenue for its authors.
- 12. Always use _______ factor authentication where available.
- 13. Erases user data beyond recoverability.
- 14. Use a _______ password different from the passwords you use to access other sites.
Down
- 1. This can slow down your computer and watch everywhere you go on the Internet.
- 2. Online traces revealing user activities.
- 4. A type of security incident where unauthorized access is gained to a system or data
- 6. _______ your computer when left unattended.
- 9. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
