Security Squares - Advanced
Across
- 4. Software designed to monitor and record network traffic
- 7. Specific training aimed at heightening knowledge within an organization
- 8. Fake jobs, fake lottery, fake money scams are all examples
- 10. Sizzle, Pork and MMM... or Junk E-mail
- 11. The fraudulent practice of sending emails ostensibly to induce others to reveal confidential information
- 13. What Spiderman spins during the night
- 15. When an attacker sends an email to the CEO pretending to be a client
- 16. A crime in which someone uses PII data to impersonate someone else
- 17. One spider, one ant, or one cricket
- 18. When you entice the fish with a worm
- 19. A malicious application or script that can be used to take advantage of a computer's vulnerability
- 20. Phishing with text
Down
- 1. A "goodguy" cap
- 2. The process of creating, communicating and maintaining policies and procedures within an organization
- 3. Images and videos that appear real but are not
- 5. When an authorized internal user poses a danger to an organization because they have authorized access to inside information
- 6. A fix for a specific issue that is an emergency
- 9. A blue monster who is obsessed with eating as many as possible of these
- 12. An extreme coughing fit
- 14. Often causes road rage