CyberSecurity Awareness Month Crossword Puzzle - Week 1
Across
- 6. What is the best way to maintain privacy between two parties?
- 7. Necessary when the circumstances of an incident require more details
- 8. This horse can stampede your security defence for the bad guy and make you look sheepish too!
- 10. When someone sends an e-mail with a link a bogus website is called
Down
- 1. What is the weakest link in cybersecurity?
- 2. What type of calls are made by social engineers
- 3. ___ was the first personal computer virus?
- 4. A common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct the malicious or unauthorized activity.
- 5. is the method where knowledge of internal and external information weaknesses of a particular organization are tested against real-world cyberattacks.
- 9. Our company may _________ your internet usage