Cybersecurity Puzzle
Across
- 2. Incidents where confidential information is stolen, leaked, or disclosed are known as what?
- 4. A strong culture equals strong _____.
- 6. This security feature requires at least two forms of authentication.
- 7. The concept of human firewalls is built on this critical aspect of security.
- 12. Attackers using manipulative techniques to scam people is known as what?
- 14. Organizational ____ are designed to keep people, data, and devices safe.
- 15. What is one of the leading causes of security incidents?
Down
- 1. This type of fraud occurs when a scammer uses stolen information to open credit cards in the victim’s name.
- 3. What is the top attack method for cybercriminals?
- 5. This type of malware encrypts data to prevent access to valuable resources.
- 6. The umbrella term covering any form of malicious code that alters the functionality of computers and smart devices.
- 8. In recent years, attackers have embraced the convenience of these.
- 9. While online threats get the most attention in the world of security, these threats pose just as much risk.
- 10. People are the last line of ____.
- 11. It is imperative to ensure accounts are protected with these.
- 13. If you encounter a phishing attack, what should you do immediately?