Puzzle No. 2
Across
- 3. A string of characters used to verify the identity of a user during the authentication process.
- 5. A type of ATM scam wherein a thin device is inserted in ATM or POS terminal to capture and harvest data from EMV-chip enabled cards.
- 8. Ensuring that authorized users have access to information and associated assets when required.
- 10. Sentence-like format of password which is strong but easier to remember.
- 13. Refers to the technologies, processes, and practices designed to protect information assets and consumers by preventing, detecting and responding to cyber-attacks.
- 14. You should not write down your password in this type of physical medium.
Down
- 1. A possibility that a threat exploits vulnerability in an information asset, leading to an adverse impact on the organization.
- 2. Ensuring that information is accessible only to those authorized to have access.
- 4. Safeguarding the accuracy and completeness of information.
- 5. Complete the sentence: ________ is everyone’s responsibility.
- 6. A weakness in your security policy, implementation, design, and controls.
- 7. These fix general software problems and provide new security patches where criminals might get in.
- 9. A common social engineering attack which usually channeled via email message, whereby someone pretends to be from a legitimate entity to lure you to provide personal or financial data.
- 11. An event that will cause harm to you or your asset.
- 12. Your password is considered ____ if it is a combination of upper and lowercase letters, numbers, punctuation, and special symbols.