tses

1234567891011121314
Across
  1. 2. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  2. 3. Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
  3. 4. A program that prevents, detects, and removes viruses or other malware from a computer system.
  4. 5. It should be changed immediately if suspected of being compromised .
  5. 7. _______ your data regularly and periodically check that you are able to restore them.
  6. 8. If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
  7. 10. Do not provide your _______ email account to social networks.
  8. 11. displays annoying pop-ups to generate revenue for its authors.
  9. 12. Always use _______ factor authentication where available.
  10. 13. Erases user data beyond recoverability.
  11. 14. Use a _______ password different from the passwords you use to access other sites.
Down
  1. 1. This can slow down your computer and watch everywhere you go on the Internet.
  2. 2. Online traces revealing user activities.
  3. 4. A type of security incident where unauthorized access is gained to a system or data
  4. 6. _______ your computer when left unattended.
  5. 9. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.