Cybersecurity Awareness Month Crossword 1

123456789
Across
  1. 2. What system are we using to make logging in more secure than passwords?
  2. 3. What you should do if you are unsure of, or see a suspicious email.
  3. 5. An email attempting to get you to reveal information, often with an urgent tone.
  4. 7. _Phishing A type of phishing campaign that targets a specific person or group.
  5. 9. A type of malicious software designed to block access to a computer system until a sum of money is paid.
Down
  1. 1. The act of making an email look like it's coming from a legitimate or trusted source.
  2. 4. Software that is specifically designed to disrupt, damage, or gain unauthorized access.
  3. 5. _-backing The act of following someone into a secured area after they've used their badge.
  4. 6. _Engineering The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
  5. 8. What you should always do with your mouse before clicking a link.