TTUTC Cyber Security Awareness Month

12345678910111213141516171819
Across
  1. 5. Measures taken to protect personal information from unauthorized access (two words).
  2. 14. A branch of computer science that aims to create machines capable of intelligent behavior (two words).
  3. 16. An individual or group who uses their skills to gain unauthorized access to computer systems for various purposes.
  4. 17. A type of attack that tricks individuals into making decisions or divulging confidential information (two words).
  5. 18. A program that appears harmless but is designed to perform malicious actions (two words).
Down
  1. 1. An authentication method that uses a combination of something you know, something you have, and something you are (Abbreviation).
  2. 2. When a hacker bypasses physical access controls by following an authorized person inside.
  3. 3. An attack that uses a thumb drive to install malware on your computer. (two words).
  4. 4. Information security is our shared ______
  5. 6. The ethical concerns and considerations surrounding the use of AI in various applications (two words).
  6. 7. A technique where attackers trick individuals into revealing sensitive information.
  7. 8. Policy A term in a policy that emphasizes keeping the workspace free of sensitive information when not in use (two words).
  8. 9. Malicious software designed to harm or exploit computer systems.
  9. 10. Over-the-phone-based social engineering.
  10. 11. Incidents where sensitive information is accessed without authorization (two words).
  11. 12. The process of encoding information to make it unreadable without the proper decryption key.
  12. 13. Widely used in-home network technology that allows for wireless connection in interfacing with the internet
  13. 15. A set of characters used to authenticate and access a system.
  14. 19. A type of malware that encrypts files and demands a ransom for their release.