Across
- 4. Sense created by the attacker to make you react quickly without thinking.
- 5. When a person slips in the door behind you without your knowledge or consent and without using the proper access cards.
- 6. Software attack method to harm or exploit a device or network.
- 7. Additional layer of security that verifies a user's access to an account more than once. (Acronym)
Down
- 1. Impersonate certain people or job roles like Tech Support or Human Resources to persuade you to release information or perform a dangerous action.
- 2. An individual who represents the last line of defense in a world where the threat landscape is constantly changing.
- 3. Online platforms that cyber criminals can use to gather information to better target you or your organisation. (Two words)
- 4. The address of a webpage which you check the validity of before clicking it. (Acronym)