Cyber Smart Edition 1
Across
- 3. We learned more about Personally Identifiable Information (PII), which includes full name, identification numbers (passports, national identification cards, and employee numbers), date of birth, financial information, and _____ records.
- 6. attacks often happen due to ______ error.
- 7. renewed focus on data _____ and privacy
Down
- 1. data classification can apply to documents, ______ and attachments according to the level of confidentiality and sensitivity of data.
- 2. ______ typically encrypts the victim’s data, making it inaccessible until a ransom is paid. The encryption can be very strong, making it difficult for security professionals to decrypt the files without the encryption key.
- 4. responsibility Cyber security is indeed a collective _____
- 5. Phishing scams have also become more sophisticated, going beyond email to SMS, social media apps and messaging platforms, with attackers using social engineering tactics to trick users into giving away ______ information