Across
- 3. An Enterprise's portal that provides cybersecurity information to enhance security awareness of employees
- 5. Also known as Two-Factor Authentication
- 7. _ _ _ _ _ _ Engineering is tricking people to gain access
- 8. Cyber _ _ _ _ _ _ is any malicious attempt to breach or gain unauthorized access to data
Down
- 1. Impersonate a trusted source to deceive individuals or systems
- 2. Suspicious messages designed to fool you into clicking, downloading, or giving information
- 3. Unsolicited junk mail, often phishing related
- 4. Common delivery method for phishing messages
- 6. Is the chance that a threat will exploit a vulnerability and cause damage
- 9. Login information sought by phishers
