1:00
en
CR
Columbia College Security Awareness Crossword Puzzle
38
Pet: When creating a password do not use words from your favorite sport, team, hobby, recording artist or ________.
Subject: Healthy email always includes a clear and specific ____________ line.
Trash: Before you throw something in the ________, ask yourself, "Is this something I would give to an unauthorized person or want to become publicly available?"
Firewall: A __________ is hardware or software that helps keep hackers from using your computer and it watches for outside attempts to access your sysytem and blocks communition that you don't permit.
Google: __________ is a popular web search engine.
Password: Never share your _________ with another person.
Toothbrush: Your password is like a ________; use it regularly, change it often, and do not share it with anyone else.
Cash: Protect your laptop, cell phone or any other mobile devices by treating it like _______.
Reduce: To ________ the amount of spam you receive, be careful who you give your email address to.
Chain: Never forward any _________ letter.
Database: A collection of information that is organized so that it can easily be accessed, managed, and updated.
Risk: A __________ Assessment is the process by which risks are identified and the impact of those risks determined.
Spyware: _________ is software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user.
File: A computer ______ can be considered as the modern counterpart of a paper document.
Hoax: A __________ is often an email that gets mailed in chain letter fashion describing some devasting, highly unlikely type of virus.
Unattended: Do not leave your laptop or computer ____________.
Malware: Also known as malicious software; any program or file that is harmful to a computer user.
USB: __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
Letters: A password is stronger by using a combination of both upper and lower case ___________.
Eight: Passwords should always be at least this many characters long.
Lock: Always ___________ your computer when you leave your desk.
Remember: Choose a password that is easy for you to ____________ but hard for someone to guess.
Shredder: Use this tool to dispose of documents that contain personal or financial information.
Share: Do not __________ your password or account with anyone.
Phishing: Email scam or attempt to trick you into giving your password or personal information.
Email: To protect personal information, avoid sending it via_________.
Numbers: A secure password should contain at least two of these.
Encryption: Applied to data to protect it from unauthorized use in case of theft or loss.
Aware: Another word for understanding, knowledge and well-informed.
Write: Do not _______ your password down or attach it to your keyword or monitor.
Different: Use __________ passwords for the various accounts that you may have.
Social Engineering: The art of tricking or manipulating people into providing information that they normally would not provide. (2 words)
Antivirus: A software that is designed to detect and destroy computer viruses.
Identity Theft: The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
Sensitive: Do not send __________ information over email.
Solutions Center: If you have any question or concerns about an email that you receive you can send it to CChelpdesk@ccis.edu or contact the _______ _______. (2 words)
Changed: Faculty and staff passwords are required to be _________ every 90 days.
Privacy: ________ laws such as FERPA and HIPAA are designed for the regulation of personal information about individuals which can be collected by governments and other public and private organizations.
Security: The state of being free from danger or threat.
Columbia College Security Awareness Crossword Puzzle
Across:1. | The art of tricking or manipulating people into providing information that they normally would not provide. (2 words) | 3. | When creating a password do not use words from your favorite sport, team, hobby, recording artist or ________. | 7. | Always ___________ your computer when you leave your desk. | 9. | __________ is a popular web search engine. | 10. | A collection of information that is organized so that it can easily be accessed, managed, and updated. | 15. | If you have any question or concerns about an email that you receive you can send it to CChelpdesk@ccis.edu or contact the _______ _______. (2 words) | 17. | Use __________ passwords for the various accounts that you may have. | 19. | Protect your laptop, cell phone or any other mobile devices by treating it like _______. | 22. | A __________ is hardware or software that helps keep hackers from using your computer and it watches for outside attempts to access your sysytem and blocks communition that you don't permit. | 23. | Another word for understanding, knowledge and well-informed. | 25. | A software that is designed to detect and destroy computer viruses. | 26. | Do not leave your laptop or computer ____________. | 27. | Do not send __________ information over email. | 30. | __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain. | 32. | A __________ is often an email that gets mailed in chain letter fashion describing some devasting, highly unlikely type of virus. | 34. | Never forward any _________ letter. | 35. | Do not _______ your password down or attach it to your keyword or monitor. | 36. | A computer ______ can be considered as the modern counterpart of a paper document. | 37. | A password is stronger by using a combination of both upper and lower case ___________. |
| | Down:2. | The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words) | 4. | Your password is like a ________; use it regularly, change it often, and do not share it with anyone else. | 5. | Use this tool to dispose of documents that contain personal or financial information. | 6. | Faculty and staff passwords are required to be _________ every 90 days. | 8. | To ________ the amount of spam you receive, be careful who you give your email address to. | 11. | The state of being free from danger or threat. | 12. | A __________ Assessment is the process by which risks are identified and the impact of those risks determined. | 13. | ________ laws such as FERPA and HIPAA are designed for the regulation of personal information about individuals which can be collected by governments and other public and private organizations. | 14. | Choose a password that is easy for you to ____________ but hard for someone to guess. | 16. | Never share your _________ with another person. | 18. | A secure password should contain at least two of these. | 20. | Also known as malicious software; any program or file that is harmful to a computer user. | 21. | Passwords should always be at least this many characters long. | 24. | Applied to data to protect it from unauthorized use in case of theft or loss. | 27. | _________ is software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user. | 28. | Healthy email always includes a clear and specific ____________ line. | 29. | To protect personal information, avoid sending it via_________. | 31. | Do not __________ your password or account with anyone. | 33. | Before you throw something in the ________, ask yourself, "Is this something I would give to an unauthorized person or want to become publicly available?" |
| |
© 2016
PuzzleFast.com, Noncommercial Use Only
Columbia College Security Awareness Crossword Puzzle
Across:1. | The art of tricking or manipulating people into providing information that they normally would not provide. (2 words) | 3. | When creating a password do not use words from your favorite sport, team, hobby, recording artist or ________. | 7. | Always ___________ your computer when you leave your desk. | 9. | __________ is a popular web search engine. | 10. | A collection of information that is organized so that it can easily be accessed, managed, and updated. | 15. | If you have any question or concerns about an email that you receive you can send it to CChelpdesk@ccis.edu or contact the _______ _______. (2 words) | 17. | Use __________ passwords for the various accounts that you may have. | 19. | Protect your laptop, cell phone or any other mobile devices by treating it like _______. | 22. | A __________ is hardware or software that helps keep hackers from using your computer and it watches for outside attempts to access your sysytem and blocks communition that you don't permit. | 23. | Another word for understanding, knowledge and well-informed. | 25. | A software that is designed to detect and destroy computer viruses. | 26. | Do not leave your laptop or computer ____________. | 27. | Do not send __________ information over email. | 30. | __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain. | 32. | A __________ is often an email that gets mailed in chain letter fashion describing some devasting, highly unlikely type of virus. | 34. | Never forward any _________ letter. | 35. | Do not _______ your password down or attach it to your keyword or monitor. | 36. | A computer ______ can be considered as the modern counterpart of a paper document. | 37. | A password is stronger by using a combination of both upper and lower case ___________. |
| | Down:2. | The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words) | 4. | Your password is like a ________; use it regularly, change it often, and do not share it with anyone else. | 5. | Use this tool to dispose of documents that contain personal or financial information. | 6. | Faculty and staff passwords are required to be _________ every 90 days. | 8. | To ________ the amount of spam you receive, be careful who you give your email address to. | 11. | The state of being free from danger or threat. | 12. | A __________ Assessment is the process by which risks are identified and the impact of those risks determined. | 13. | ________ laws such as FERPA and HIPAA are designed for the regulation of personal information about individuals which can be collected by governments and other public and private organizations. | 14. | Choose a password that is easy for you to ____________ but hard for someone to guess. | 16. | Never share your _________ with another person. | 18. | A secure password should contain at least two of these. | 20. | Also known as malicious software; any program or file that is harmful to a computer user. | 21. | Passwords should always be at least this many characters long. | 24. | Applied to data to protect it from unauthorized use in case of theft or loss. | 27. | _________ is software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user. | 28. | Healthy email always includes a clear and specific ____________ line. | 29. | To protect personal information, avoid sending it via_________. | 31. | Do not __________ your password or account with anyone. | 33. | Before you throw something in the ________, ask yourself, "Is this something I would give to an unauthorized person or want to become publicly available?" |
| |
© 2016
PuzzleFast.com, Noncommercial Use Only