Cyber Smart Edition 1

1234567
Across
  1. 3. We learned more about Personally Identifiable Information (PII), which includes full name, identification numbers (passports, national identification cards, and employee numbers), date of birth, financial information, and _____ records.
  2. 6. attacks often happen due to ______ error.
  3. 7. renewed focus on data _____ and privacy
Down
  1. 1. data classification can apply to documents, ______ and attachments according to the level of confidentiality and sensitivity of data.
  2. 2. ______ typically encrypts the victim’s data, making it inaccessible until a ransom is paid. The encryption can be very strong, making it difficult for security professionals to decrypt the files without the encryption key.
  3. 4. responsibility Cyber security is indeed a collective _____
  4. 5. Phishing scams have also become more sophisticated, going beyond email to SMS, social media apps and messaging platforms, with attackers using social engineering tactics to trick users into giving away ______ information