Across
- 1. Fraudulent attempt to obtain sensitive information via email.
- 2. A type of malicious software that locks files and demands payment.
- 5. When employees unknowingly help hackers, it's called an ___ threat.
- 8. Regularly updating this can patch security vulnerabilities.
- 9. Security appliance that limits access to data or systems.
Down
- 1. A secret word or phrase used to gain access to a system.
- 3. Portable devices like USBs can carry this kind of malicious code.
- 4. A common workplace policy: "Don't write your password on a ___."
- 6. Two-step process to verify identity.
- 7. You should never connect to public ___ without using a VPN.
