Across
- 2. / Tool is often used to help create and store complex passwords.
- 3. / Most commonly targeted entity of cyber attacks in an organization.
- 6. / A type of cyber attack that tricks users into giving up personal information.
- 7. / Who should you report a suspicious email to?
- 8. / The person or department you should approach with documented security concerns.
Down
- 1. / This attack is when an unauthorized individual follows through the doorway behind an authorized employee.
- 4. / What should you use as a way to have multiple forms of authentication on your accounts?
- 5. / Tactic where the attacker looks over your shoulder or from a distance while attempting to gather information.