Icon Créer jeu Créer jeu

Cyber Security Awareness Month 2023

Mots Croisés

Confront and conquer Game 4, Crossword Puzzle, a true test of your resilience and a living testament to the knowledge gained through your training and awareness. Your determination and expertise are our greatest hope to fend off digital terrors that rise from the grave.

Téléchargez la version pour jouer sur papier

Âge recommandé: 16 ans
6 fois fait

Créé par

United States
Créez votre propre jeu gratuite à partir de notre créateur de jeu
Affrontez vos amis pour voir qui obtient le meilleur score dans ce jeu

Top Jeux

  1. temps
    but
  1. temps
    but
temps
but
temps
but
 
game-icon

Mots Croisés

Cyber Security Awareness Month 2023Version en ligne

Confront and conquer Game 4, Crossword Puzzle, a true test of your resilience and a living testament to the knowledge gained through your training and awareness. Your determination and expertise are our greatest hope to fend off digital terrors that rise from the grave.

par Elaine Armstrong
1

A social engineering tactic using phone calls to trick individuals into revealing personal information.

2

Use this for outbound/external email messaging to transform your data into an unreadable format using complex algorithms.

3

A social engineering tactic using a compelling text message to trick targeted recipients into clicking a link and sending the attacker private information or downloading malicious programs.

4

An attack that blocks access to your computer or files.

5

A technique in which an attacker sends a fraudulent email, claiming to be from a reputable and trusted source to trick recipient into revealing financial information, credentials, or other sensitive information.

6

A tactic used to manipulate, influence, or deceive a victim into revealing sensitive information or performing ill-advised actions. (two words, no space).

7

Avoid using reusing ________ across different online sites. If one of these gets breached, cybercriminals can use it to access all of the accounts associated with it.

8

A targeted email attack directed at a specific individual. The email appears to come from someone you’ve contacted before and have no reason to distrust the sender. (two words, no space)

9

You must protect this proof of identity that includes personal information to access the Travelport network. Travelport, including the IT help desk, will never ask you for this.

10

Immediately report suspicious emails to the Security Operations Center (SOC) using the ___________ button in Outlook. (two words)

2
1
10
4
5
7
8
9
educaplay suscripción