CyberSecurity Awareness Month Crossword Puzzle - Week 1
Across
- 4. what is the weakest link in cybersecurity?
- 7. ___ was the first personal computer virus?
- 8. A common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct the malicious or unauthorized activity.
- 9. Necessary when the circumstances of an incident require more details
- 10. Our company may _________ your internet usage
Down
- 1. is the method where knowledge of internal and external information weaknesses of a particular organization are tested against real-world cyberattacks.
- 2. What is the best way to maintain privacy between two parties?
- 3. When someone sends an e-mail with a link a bogus website is called
- 5. This horse can stampede your security defence for the bad guy and make you look sheepish too!
- 6. What type of calls are made by social engineers