CAM

123456
Across
  1. 3. The place to go to learn about emerging cybersecurity threats
  2. 4. Software designed with malicious intent
  3. 5. An email designed to get you to take an action, like download a file, open an attachment or click a link
  4. 6. These help identify you protect information and should be created to be strong, complex and unique
Down
  1. 1. Where to forward suspicious emails
  2. 2. Software Social engineering technique that realistically mimics a person’s voice in fake videos and phone calls