Icon New game New game

Cyber Security Awareness Month 2023

Crossword Puzzle

Confront and conquer Game 4, Crossword Puzzle, a true test of your resilience and a living testament to the knowledge gained through your training and awareness. Your determination and expertise are our greatest hope to fend off digital terrors that rise from the grave.

Download the paper version to play

Recommended age: 16 years old
6 times made

Created by

United States
Make your own free game from our game creator
Compete against your friends to see who gets the best score in this game

Top Games

  1. time
    score
  1. time
    score
time
score
time
score
 
game-icon

Crossword Puzzle

Cyber Security Awareness Month 2023Online version

Confront and conquer Game 4, Crossword Puzzle, a true test of your resilience and a living testament to the knowledge gained through your training and awareness. Your determination and expertise are our greatest hope to fend off digital terrors that rise from the grave.

by Elaine Armstrong
1

A social engineering tactic using phone calls to trick individuals into revealing personal information.

2

Use this for outbound/external email messaging to transform your data into an unreadable format using complex algorithms.

3

A social engineering tactic using a compelling text message to trick targeted recipients into clicking a link and sending the attacker private information or downloading malicious programs.

4

An attack that blocks access to your computer or files.

5

A technique in which an attacker sends a fraudulent email, claiming to be from a reputable and trusted source to trick recipient into revealing financial information, credentials, or other sensitive information.

6

A tactic used to manipulate, influence, or deceive a victim into revealing sensitive information or performing ill-advised actions. (two words, no space).

7

Avoid using reusing ________ across different online sites. If one of these gets breached, cybercriminals can use it to access all of the accounts associated with it.

8

A targeted email attack directed at a specific individual. The email appears to come from someone you’ve contacted before and have no reason to distrust the sender. (two words, no space)

9

You must protect this proof of identity that includes personal information to access the Travelport network. Travelport, including the IT help desk, will never ask you for this.

10

Immediately report suspicious emails to the Security Operations Center (SOC) using the ___________ button in Outlook. (two words)

2
1
10
4
5
7
8
9
educaplay suscripción