Harper Cybersecurity Review
Across
- 4. software we use to protect your laptop
- 6. phishing attack thorough voice or phone call
- 7. our email filter system
- 9. #1 threat to our security
- 10. usual media that a phish comes to
- 11. type of request that is weird
- 14. tactic that a phisher uses
- 15. social media site where phisher researches
- 16. phishing attack through text message
- 17. used in phishing attack called Quishing
Down
- 1. where people write the Wifi password
- 2. public charging station stealing your info
- 3. used for remote access
- 5. authentication for VPN access
- 8. Information Security is everyone's
- 12. 12 or more characters
- 13. site where you can scan your own attachments