Iroquois Cyber Security Crossword

123456789101112131415161718192021222324
Across
  1. 1. Multi Factor Authentication
  2. 3. When you are unsure a URL is real
  3. 5. What not to do for unknown texts
  4. 7. What to do to numbers of unwanted texts
  5. 8. A classic in person attack
  6. 10. Phone based social engineering
  7. 12. malicious software
  8. 13. A way to harvest data
  9. 14. Subtle signs of danger
  10. 15. Bypassing physical access controls
  11. 19. Phishing that targets users
  12. 20. How Colonial Pipeline was attacked
  13. 24. Email based social engineering
Down
  1. 2. Social Media used to gather info
  2. 4. Used to separate parts of a URL
  3. 6. The art of deceiving
  4. 9. Scrambles data in a computer
  5. 11. What you hover over in an email
  6. 16. Text based Social Engineering
  7. 17. Button in Outlook to report emails
  8. 18. A website address
  9. 21. Who does cybercrime target?
  10. 22. Type of drive used to store data
  11. 23. Used for Man in the middle attacks