Security Awareness
Across
- 4. The process of verifying the identity of a user or a piece of information
- 6. A method for guessing a password that involves systematically trying a high volume of possible combinations of characters until the correct one is found
- 8. Which month is observed as Insider Threat month?
- 9. The use of AI to replace the likeness of one person with another in video or audio
- 10. Abbreviation of an attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other
Down
- 1. A weakness in the system is called --------------------
- 2. Malware that uses tactics, often in the form of pop-ups that falsely warn users they have been infected with a virus, to trick users into visiting malware-containing websites
- 3. Targeted phishing attack aimed at senior executives masquerading as a legitimate email
- 5. The use of electronic means, primarily messaging and social media platforms, to bully and harass a victim
- 7. A kind of spyware software that records every keystroke made on a computer’s keyboard