Security Awareness

12345678910
Across
  1. 2. Stealing sensitive information by watching someone enter details over their shoulder.
  2. 8. A scam that involves a fraudulent phone call to steal personal information.
  3. 9. A fraudulent activity using text messages to deceive and steal information.
  4. 10. Security method requiring two or more verification factors.
Down
  1. 1. An attempt to obtain sensitive information by disguising as a trustworthy entity.
  2. 3. Crime involving the fraudulent use of another person's personal information.
  3. 4. Act of pretending to be someone else to deceive others.
  4. 5. Security breach where an unauthorized person follows someone into a restricted area.
  5. 6. A secret word or phrase used to gain access to a system or service.
  6. 7. Malicious software designed to damage or infiltrate systems.