Cyber security crossword puzzle

123456789
Across
  1. 3. A technique of verifying identities before granting access to information.
  2. 4. The practice of keeping sensitive information in private and secure places.
  3. 6. Preventing attackers from gathering personal or sensitive information about you.
  4. 7. Management The action of identifying and managing risks in an organization’s security plan.
  5. 8. A social engineering technique where attackers attempt to manipulate victims using fake identities.
  6. 9. Keeping track of who accesses sensitive information and when.
Down
  1. 1. A method used to ensure that only authorized users can access sensitive data.
  2. 2. The process of verifying a person’s identity through various means, like passwords, biometrics, or tokens.
  3. 5. The act of notifying employees about security risks and best practices.