Cybersecurity Awareness -

12345678910
Across
  1. 5. [?] is a situation where a victim is tempted into clicking a malicious link
  2. 6. Virus, Trojans and Worms are forms of [?]
  3. 8. [?] are attackers whose motivation are political or social causes
  4. 9. [?] is the term we used to to state that a transaction performed cannot be denied
  5. 10. The minimum length of password we aim for is [?} numeric representation
Down
  1. 1. [?} is a common social engineering tactic involving fake emails
  2. 2. Fingerprint and/or facial recognition are form of authentication known as [?] scans
  3. 3. The term [?] is commonly used in cybersecurity as a representation of weakness
  4. 4. Account [?} is when an employee's email is hacked and used to make payments to fraudster's accounts.
  5. 7. The microsoft brand for mobile device management is known as [?]