Cybersecurity Month Week 4
Across
- 4. Recognizing a suspicious email is an example of identifying this type of threat.
- 6. Leaving this open can lead to unauthorized access in a facility.
- 7. The first goal of information security is to prevent these.
Down
- 1. The second goal of information security is to reduce this when events occur.
- 2. This type of attack occurred after malware was downloaded from a phishing email.
- 3. Eric should have shredded papers containing this sensitive data.
- 5. If you see something, you should do this immediately.