CyberSecurity Awareness Month Crossword Puzzle - Week 1

12345678910
Across
  1. 6. What is the best way to maintain privacy between two parties?
  2. 7. Necessary when the circumstances of an incident require more details
  3. 8. This horse can stampede your security defence for the bad guy and make you look sheepish too!
  4. 10. When someone sends an e-mail with a link a bogus website is called
Down
  1. 1. What is the weakest link in cybersecurity?
  2. 2. What type of calls are made by social engineers
  3. 3. ___ was the first personal computer virus?
  4. 4. A common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct the malicious or unauthorized activity.
  5. 5. is the method where knowledge of internal and external information weaknesses of a particular organization are tested against real-world cyberattacks.
  6. 9. Our company may _________ your internet usage