Cybersecurity Month Week 4

1234567
Across
  1. 4. Recognizing a suspicious email is an example of identifying this type of threat.
  2. 6. Leaving this open can lead to unauthorized access in a facility.
  3. 7. The first goal of information security is to prevent these.
Down
  1. 1. The second goal of information security is to reduce this when events occur.
  2. 2. This type of attack occurred after malware was downloaded from a phishing email.
  3. 3. Eric should have shredded papers containing this sensitive data.
  4. 5. If you see something, you should do this immediately.