Across
- 5. Measures taken to protect personal information from unauthorized access (two words).
- 14. A branch of computer science that aims to create machines capable of intelligent behavior (two words).
- 16. An individual or group who uses their skills to gain unauthorized access to computer systems for various purposes.
- 17. A type of attack that tricks individuals into making decisions or divulging confidential information (two words).
- 18. A program that appears harmless but is designed to perform malicious actions (two words).
Down
- 1. An authentication method that uses a combination of something you know, something you have, and something you are (Abbreviation).
- 2. When a hacker bypasses physical access controls by following an authorized person inside.
- 3. An attack that uses a thumb drive to install malware on your computer. (two words).
- 4. Information security is our shared ______
- 6. The ethical concerns and considerations surrounding the use of AI in various applications (two words).
- 7. A technique where attackers trick individuals into revealing sensitive information.
- 8. Policy A term in a policy that emphasizes keeping the workspace free of sensitive information when not in use (two words).
- 9. Malicious software designed to harm or exploit computer systems.
- 10. Over-the-phone-based social engineering.
- 11. Incidents where sensitive information is accessed without authorization (two words).
- 12. The process of encoding information to make it unreadable without the proper decryption key.
- 13. Widely used in-home network technology that allows for wireless connection in interfacing with the internet
- 15. A set of characters used to authenticate and access a system.
- 19. A type of malware that encrypts files and demands a ransom for their release.
