Protect for Points: Hybrid Work Crossword
Across
- 4. A security incident in which sensitive information is exposed or stolen (10 letters).
- 6. An attempt to gain unauthorized access for malicious purposes (11 letters).
- 10. A set of guidelines for information security (20 letters).
- 14. A security measure requiring two forms of identification (21 letters).
- 15. A secure connection to a remote network (3 letters).
- 16. Sending fraudulent emails or messages to trick people (8 letters).
Down
- 1. A security measure requiring multiple forms of identification (23 letters).
- 2. The practice of maintaining good online habits (11 letters).
- 3. A security vulnerability unknown to the software vendor (15 letters).
- 5. Any software that harms or exploits a computer system (7 letters).
- 7. The process of converting data into a coded language (10 letters).
- 8. A device connected to a network (8 letters).
- 9. A security system that monitors and controls incoming and outgoing network traffic (8 letters).
- 11. A software update that fixes security vulnerabilities (5 letters).
- 12. A targeted form of phishing that is personalized (13 letters).
- 13. The type of engineering used for psychological manipulation to trick people into divulging confidential information (5 letters).