Cyber Security

12345678
Across
  1. 2. The type of engineering which targets "bugs in the human hardware"
  2. 5. The process by which an individual’s access to accounts and data is reviewed on a routine basis.
  3. 7. Complete this phrase "Where to Store, What to _____"
  4. 8. What you are if you complete this crossword by the end of the week.
Down
  1. 1. A small file placed on a computer by a website assigning a unique ID to the device
  2. 3. Permission entitled to an individual allowing them to use a system or view data.
  3. 4. Recently published CHS notice relating to how CHS handles employees personal data.
  4. 6. CHS approved Password Manager.