Puzzle No. 2

1234567891011121314
Across
  1. 4. A common type of memorized secret, characterized by a string of characters used to verify the identity of a user during the authentication process.
  2. 5. Ensuring that authorized users have access to information and associated assets when required.
  3. 7. These fix general software problems and provide new security patches where criminals might get in.
  4. 9. A type of ATM scam wherein a thin device is inserted in ATM or POS terminal to capture and harvest data from EMV-chip enabled cards.
  5. 10. Sentence-like format of password which is strong but easier to remember.
  6. 12. A weakness in your security policy, implementation, design, and controls.
  7. 13. Your password is considered ____ if it is a combination of upper and lowercase letters, numbers, punctuation, and special symbols.
  8. 14. You should not write down your password in this type of physical medium.
Down
  1. 1. A common social engineering attack which usually channeled via email message, whereby someone pretends to be from a legitimate entity to lure you to provide personal or financial data.
  2. 2. Refers to the technologies, processes, and practices designed to protect information assets and consumers by preventing, detecting and responding to cyber-attacks.
  3. 3. Ensuring that information is accessible only to those authorized to have access.
  4. 6. An event that will cause harm to you or your asset.
  5. 8. A possibility that a threat exploits vulnerability in an information asset, leading to an adverse impact on the organization.
  6. 9. ”________ is everyone’s responsibility”.
  7. 11. Safeguarding the accuracy and completeness of information.