Protect for Points: Hybrid Work Crossword

12345678910111213141516
Across
  1. 4. A security incident in which sensitive information is exposed or stolen (10 letters).
  2. 6. An attempt to gain unauthorized access for malicious purposes (11 letters).
  3. 10. A set of guidelines for information security (20 letters).
  4. 14. A security measure requiring two forms of identification (21 letters).
  5. 15. A secure connection to a remote network (3 letters).
  6. 16. Sending fraudulent emails or messages to trick people (8 letters).
Down
  1. 1. A security measure requiring multiple forms of identification (23 letters).
  2. 2. The practice of maintaining good online habits (11 letters).
  3. 3. A security vulnerability unknown to the software vendor (15 letters).
  4. 5. Any software that harms or exploits a computer system (7 letters).
  5. 7. The process of converting data into a coded language (10 letters).
  6. 8. A device connected to a network (8 letters).
  7. 9. A security system that monitors and controls incoming and outgoing network traffic (8 letters).
  8. 11. A software update that fixes security vulnerabilities (5 letters).
  9. 12. A targeted form of phishing that is personalized (13 letters).
  10. 13. The type of engineering used for psychological manipulation to trick people into divulging confidential information (5 letters).