Icon Crear Crear

Cyber Security Awareness Month 2023

Crucigrama

Confront and conquer Game 4, Crossword Puzzle, a true test of your resilience and a living testament to the knowledge gained through your training and awareness. Your determination and expertise are our greatest hope to fend off digital terrors that rise from the grave.

Descarga la versión para jugar en papel

Edad recomendada: 16 años
6 veces realizada

Creada por

Estados Unidos
Crea tu propio juego gratis desde nuestro creador de juegos
Compite contra tus amigos para ver quien consigue la mejor puntuación en esta actividad

Top juegos

  1. tiempo
    puntuacion
  1. tiempo
    puntuacion
tiempo
puntuacion
tiempo
puntuacion
 
game-icon

Crucigrama

Cyber Security Awareness Month 2023Versión en línea

Confront and conquer Game 4, Crossword Puzzle, a true test of your resilience and a living testament to the knowledge gained through your training and awareness. Your determination and expertise are our greatest hope to fend off digital terrors that rise from the grave.

por Elaine Armstrong
1

A social engineering tactic using phone calls to trick individuals into revealing personal information.

2

Use this for outbound/external email messaging to transform your data into an unreadable format using complex algorithms.

3

A social engineering tactic using a compelling text message to trick targeted recipients into clicking a link and sending the attacker private information or downloading malicious programs.

4

An attack that blocks access to your computer or files.

5

A technique in which an attacker sends a fraudulent email, claiming to be from a reputable and trusted source to trick recipient into revealing financial information, credentials, or other sensitive information.

6

A tactic used to manipulate, influence, or deceive a victim into revealing sensitive information or performing ill-advised actions. (two words, no space).

7

Avoid using reusing ________ across different online sites. If one of these gets breached, cybercriminals can use it to access all of the accounts associated with it.

8

A targeted email attack directed at a specific individual. The email appears to come from someone you’ve contacted before and have no reason to distrust the sender. (two words, no space)

9

You must protect this proof of identity that includes personal information to access the Travelport network. Travelport, including the IT help desk, will never ask you for this.

10

Immediately report suspicious emails to the Security Operations Center (SOC) using the ___________ button in Outlook. (two words)

2
1
10
4
5
7
8
9
educaplay suscripción