My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Secure CHUHAK

Horizontales
Software that enables a user to covertly obtain information about another by transmitting data from their hard drive.
Protected Health Information
Even with all the latest security software in place, a system is still _______ if a user does not exercise caution.
________ authentication requires that a response from a 2nd device be obtained before login can be completed.
_______ involves injecting malicious advertisements into legitimate online webpages.
Before opening a suspicious email you should call the ______ to verify they sent it.
An attempt to acquire sensitive information such as usernames or passwords.
SSN, drivers license, email address are all examples of _____.
Over 15 million Americans were victims of this crime in 2016.
Software that is designed to intentionally damage or disable computers.
Your IT Department performs routine ________ every month to keep your accounts, computers and servers secure.
Verticales
When a person or program masquerades as another by falsifying data.
Our current passwords require this many characters.
An attempt to acquire sensitive account information from a specific individual.
In order to secure a thumb drive you must ______ the drive.
Name of the fax server that delivers faxes to your direct number.
Email received from an _______ source is a red flag that it may be malicious.
An incident where information is stolen from a system without knowledge or authorization of the system's owner.
A Federal law that restricts access to individuals' private medical information.
Malicious software that blocks access to a computer system or data until a sum of money is paid.