Security Awareness Crossword Puzzle
a crossword puzzle by
PuzzleFast Instant Puzzle Maker
Puzzle URL
https://www.puzzlefast.com/en/puzzles/20150211004336
To embed this puzzle on your website, paste the markup below into your HTML. Change the width and height values as desired.
Plain Puzzle
Plain Puzzle Without Solution Link
Hide This
1:00
en
CR
Security Awareness Crossword Puzzle
27
Sport: When creating a password do not use words from your favorite pet, team, hobby, recording artist or ________.
Subject: Healthy email always includes a clear and specific ____________ line.
Recycle Bin: Before you throw something in the ________, ask yourself, "Is this something I would give to an unauthorized person or want to become publicly available?" (2 words)
Firewall: A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit.
Password: Never share your _________ with another person.
Money: Protect your laptop, cell phone or any other mobile devices by treating it like _______.
Database: A collection of information that is organized so that it can easily be accessed, managed, and updated.
Risk: A __________ Assessment is the process by which risks are identified and the impact of those risks determined.
Safety: ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.
Spyware: _________ is software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user.
File: A computer ______ can be considered as the modern counterpart of a paper document.
Number: A secure password should contain at least one of these.
Encryption: Applied to data to protect it from unauthorized use in case of theft or loss.
Unattended: Do not leave your laptop or computer ____________.
Letters: A password is stronger by using a combination of both upper and lower case ___________.
Eight: Passwords should always be at least this many characters long.
Lock: Always ___________ your computer when you leave your desk.
Remember: Choose a password that is easy for you to ____________ but hard for someone to guess.
Share: Do not __________ your password or account with anyone.
Phishing: Email scam or attempt to trick you into giving your password or personal information.
Email: To protect personal information, avoid sending it via_________.
Write: Do not _______ your password down or attach it to your keyword or monitor.
Different: Use __________ passwords for the various accounts that you may have.
Antivirus: A software that is designed to detect and destroy computer viruses.
Identity Theft: The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
Sensitive: Do not send __________ information over email unless it is encrypted.
Changed: Passwords should be _________ every 3-4 months.
Security Awareness Crossword Puzzle
Across:| 3. | _________ is software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user. | | 4. | Do not _______ your password down or attach it to your keyword or monitor. | | 6. | Protect your laptop, cell phone or any other mobile devices by treating it like _______. | | 9. | Email scam or attempt to trick you into giving your password or personal information. | | 12. | Applied to data to protect it from unauthorized use in case of theft or loss. | | 14. | A __________ Assessment is the process by which risks are identified and the impact of those risks determined. | | 17. | Passwords should always be at least this many characters long. |
| | 21. | A software that is designed to detect and destroy computer viruses. | | 23. | A collection of information that is organized so that it can easily be accessed, managed, and updated. | | 24. | Use __________ passwords for the various accounts that you may have. | | 25. | A computer ______ can be considered as the modern counterpart of a paper document. | | 26. | Never share your _________ with another person. | | 27. | Before you throw something in the ________, ask yourself, "Is this something I would give to an unauthorized person or want to become publicly available?" (2 words) |
| | Down:| 1. | Do not leave your laptop or computer ____________. | | 2. | ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm. | | 5. | Choose a password that is easy for you to ____________ but hard for someone to guess. | | 7. | To protect personal information, avoid sending it via_________. | | 8. | When creating a password do not use words from your favorite pet, team, hobby, recording artist or ________. | | 10. | The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words) | | 11. | Always ___________ your computer when you leave your desk. |
| | 13. | A password is stronger by using a combination of both upper and lower case ___________. | | 15. | Do not send __________ information over email unless it is encrypted. | | 16. | Healthy email always includes a clear and specific ____________ line. | | 18. | A secure password should contain at least one of these. | | 19. | Do not __________ your password or account with anyone. | | 20. | Passwords should be _________ every 3-4 months. | | 22. | A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit. |
| |
© 2015
PuzzleFast.com, Noncommercial Use Only
Security Awareness Crossword Puzzle
Across:| 3. | _________ is software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user. | | 4. | Do not _______ your password down or attach it to your keyword or monitor. | | 6. | Protect your laptop, cell phone or any other mobile devices by treating it like _______. | | 9. | Email scam or attempt to trick you into giving your password or personal information. | | 12. | Applied to data to protect it from unauthorized use in case of theft or loss. | | 14. | A __________ Assessment is the process by which risks are identified and the impact of those risks determined. | | 17. | Passwords should always be at least this many characters long. |
| | 21. | A software that is designed to detect and destroy computer viruses. | | 23. | A collection of information that is organized so that it can easily be accessed, managed, and updated. | | 24. | Use __________ passwords for the various accounts that you may have. | | 25. | A computer ______ can be considered as the modern counterpart of a paper document. | | 26. | Never share your _________ with another person. | | 27. | Before you throw something in the ________, ask yourself, "Is this something I would give to an unauthorized person or want to become publicly available?" (2 words) |
| | Down:| 1. | Do not leave your laptop or computer ____________. | | 2. | ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm. | | 5. | Choose a password that is easy for you to ____________ but hard for someone to guess. | | 7. | To protect personal information, avoid sending it via_________. | | 8. | When creating a password do not use words from your favorite pet, team, hobby, recording artist or ________. | | 10. | The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words) | | 11. | Always ___________ your computer when you leave your desk. |
| | 13. | A password is stronger by using a combination of both upper and lower case ___________. | | 15. | Do not send __________ information over email unless it is encrypted. | | 16. | Healthy email always includes a clear and specific ____________ line. | | 18. | A secure password should contain at least one of these. | | 19. | Do not __________ your password or account with anyone. | | 20. | Passwords should be _________ every 3-4 months. | | 22. | A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit. |
| |
© 2015
PuzzleFast.com, Noncommercial Use Only