Cybersecurity Month

123456789
Across
  1. 2. ________ Information must be protected from leaks or accidental exposure.
  2. 5. Button in Outlook to report suspicious email or phishing in one click.
  3. 7. _______ Period is the length of time information assets are maintained for an authorized person.
  4. 9. Security _______ is a single or series of unwanted or unexpected information Security Events
Down
  1. 1. What is celebrated in October?
  2. 3. Information is accessible to authorized users.
  3. 4. Information is accurate, complete, and reliable.
  4. 6. Mail that seeks to offer services, products, or advertisements but it could be from either a genuine company or a cybercriminal trying to trick you.
  5. 8. A Security ______ is an identified occurrence within a system, service, or network that may be security relevant.