Across
- 7. This security tool identified and removes malicious programs
- 8. The individuals who control access to people, data, and systems
- 12. This attack occurs when cybercriminals research and track which sites employees visit the most
- 13. What should you do when a workstation or device is no longer in use
- 14. Any scenario that triggers emotions should also trigger your __________
Down
- 1. Stealing money is the main goal behind this type of malware
- 2. Failure to run these equals failure to patch security vulnerabilities
- 3. You can help fight cybercrime by becoming a ________________
- 4. ____are the last line of defense
- 5. Kwiktrip's password policy requires that coworkers change their passwords _____days
- 6. The future of security is____,not machines
- 9. This attack occurs when someone sneaks into a secured area behind someone else
- 10. This dangerous attack targets specific people or organization, often with custom made email or messages
- 11. These are designed to maintain the security of everyone associated with an organization