CyberSecurity Awareness Month Crossword Puzzle - Week 1

12345678910
Across
  1. 4. what is the weakest link in cybersecurity?
  2. 7. ___ was the first personal computer virus?
  3. 8. A common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct the malicious or unauthorized activity.
  4. 9. Necessary when the circumstances of an incident require more details
  5. 10. Our company may _________ your internet usage
Down
  1. 1. is the method where knowledge of internal and external information weaknesses of a particular organization are tested against real-world cyberattacks.
  2. 2. What is the best way to maintain privacy between two parties?
  3. 3. When someone sends an e-mail with a link a bogus website is called
  4. 5. This horse can stampede your security defence for the bad guy and make you look sheepish too!
  5. 6. What type of calls are made by social engineers