Do not store you passwords openly, use password managers like _________________
KeePass
The strongest password is: Grrrrrrrr8!!!, Go^sa!, iLm!J@c)&dl>A
iLm!J@c)&dl>A
A secure and safe website should start with ____________________
Https
____________ are necessary components to develop positive security habits.
Knowledge
When someone sends an e-mail with a link to a bogus website it is called?
Phishing
This can slow down your computer AND watch everywhere you go on the internet?
Spyware
Pretexting can also be used to impersonate co-workers, police, bank, tax authorities, , insurance investigators by a ___________________ to get personal information.
Social Engineer
It is not allowed to use your co-workers username and password to log in to any thyssenkrupp's ___________________ resources or webistes.
Network
A ________________ is a type of malware that is often disguised as legitimate software that can be employed by cyber-thieves and hackers trying to gain access to users' systems. and tricked by some form of social engineering into loading and executing Trojans on their systems.
Trojan
You should not just check identity, you should also confirm____________
Authorization
Do not plug in unknown _________________ and hand it over to IT Helpdesk
Portable media
Use a _________________ to store printed sensitive data.
File Cabinet
Do not use the same password for your Apple-ID as you are using your _____________
8ID
Do not allow other persons to use your computer! It may be used for _______________
Criminal Activities
Dont talk about __________ data in public! Even if you think no one is listening.
Sensitive
____________ transfers are stronly encrypted and more secure using passwords.
Cryptshare
Your best defense is _______________________
CommonSense
Be careful when handling ________________ of questionable origin - they cannot only cipher off information but also contain viruses and spyware that might not be recognised by your virus scanner and cause serious damage to our Company.
Portable Media
Risk of using portable storage media can include _____________________
Malware
Always lock your laptop/pc when leaving your desk with using __________________
Windows+L

Preview of Crossword

Make this Crossword your own

Add, edit, delete clues, and customize this crossword. Print copies for an entire class. All in 5 minutes.

Icon crossword    Create my Crossword now    

Your customized Crossword will be in your hands in five minutes.

Related Puzzles

Shop safety

16 terms
Created on Feb 4, 2016

Safe Workplaces

21 terms
Created on Feb 22, 2016

Internet Safety

10 terms
Created on Feb 22, 2016

Cyber Security

20 terms
Created on Apr 25, 2016

Financial Terms Crossword Puzzle

20 terms
Created on May 18, 2016

CPR

20 terms
Created on Jul 13, 2016

Social Media

20 terms
Created on Jul 20, 2016

Computer Basics !

20 terms
Created on Aug 12, 2016

Science Safety Crossword Puzzle

16 terms
Created on Aug 28, 2016

E-Safety

20 terms
Created on Nov 15, 2016

Digital Photography: Terms Review

19 terms
Created on Feb 21, 2017

Internet Safety Crossword

27 terms
Created on Apr 5, 2017

Identity Theft

20 terms
Created on Apr 14, 2017

IT&S Cyber Security Crossword Puzzle

16 terms
Created on Jun 2, 2017

Workplace Safety

17 terms
Created on Jul 5, 2017

HIPAA COMPLIANCE TRAINING

15 terms
Created on Aug 29, 2017

OPSEC is not Puzzling

20 terms
Created on Nov 14, 2017

CPR Crossword

15 terms
Created on Dec 5, 2017