Crossword Puzzle

123456789101112
Across
  1. 6. Malicious software designed to gain access to your devices
  2. 7. The process of verifying the identity of a user or device before granting access to systems and data
  3. 9. A crucial cybersecurity practice involving making copies of data to prevent loss in case of a ransomware attack
  4. 10. In the context of supply chain attacks, this is a critical factor between partners that can be exploited by cybercriminals to infiltrate networks
  5. 11. A tactic used in AI-assisted attacks where attackers mimic a trusted entity to deceive victims, often through sophisticated methods
  6. 12. A cybersecurity threat that could be exploited to gain unauthorized access or cause harm by targeting less-secure elements in the supply network
Down
  1. 1. A type of security measure that uses unique physical characteristics for user identification
  2. 2. A fundamental principle in data privacy, requiring explicit permission before collecting, using, or sharing personal information
  3. 3. A common tactic used in social engineering where the attacker creates a sense of immediate action to bypass rational decision-making
  4. 4. A type of AI technology used in sophisticated cyberattacks, involving learning from data to improve over time
  5. 5. An incident where personal or confidential information is accessed or disclosed without authorization, requiring immediate response and remediation
  6. 8. A deceptive attempt to obtain sensitive information by disguising as a trustworthy entity in an electronic communication