Across
- 2. ___ [abbreviation] refers to information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual.
- 4. ______ is software that displays ads on your computer while you are using it, often in the form of popups. It is almost always installed without your authorization or hidden with another program you installed.
- 8. ________ information is any information that can personally identify you, such as your name, address, phone numbers, Social Security number, bank account number, credit card number, etc.
- 10. Information Security Officer
- 11. _________ is the commonly used term to mean the capacity of a communication channel to pass data through the channel in a given amount of time.
- 13. The strongest password is: grrrrrrr8!, Go^sa!, John012109, Am3rica, This_P^zz1e!
- 17. ______ engineering is an approach to gain access to information primarily through misrepresentation, relying on the trusting nature of individuals.
- 18. Information Security is not just a _________ issue.
- 20. Protect your laptop, cell phone or Blackberry, etc. by treating it like ____.
Down
- 1. A ________ is hardware or software that helps keep hackers from using your computer to send out your personal information without your permission. It watches for outside attempts to access your system and blocks communications to and from sources you don’t permit.
- 3. Never share your ________ with another person.
- 5. A ____ Assessment is the process by which risks are identified and the impact of those risks determined.
- 6. ____ is a term for spam messages sent to instant message addresses.
- 7. Your password is like a _________; use it regularly, change it often, and do not share it with anyone else.
- 9. ___ [abbreviation] is the place in the computer where the application programs and data in current use are kept so they can be quickly reached by the computer’s processor.
- 12. An __________ use policy is a set of rules and guidelines that specify appropriate use of computer systems or networks.
- 14. When somebody sends an e-mail with a link to a bogus website it is called _________.
- 15. A ________ download is a program that is involuntarily downloaded to your computer, without your permission or even your awareness. It can be downloaded by simply visiting a web site or viewing an HTML email message.
- 16. Criminals sometimes use _______ - programs like viruses and spyware – to get into your computer. Once there, they can steal information, send spam, and commit fraud.
- 19. The _______ Privacy Rule focuses upon the protection of the privacy of people who seek care. (abbr.)
