Cybersecurity Awareness month at Kent!

1234567
Across
  1. 4. Sense created by the attacker to make you react quickly without thinking.
  2. 5. When a person slips in the door behind you without your knowledge or consent and without using the proper access cards.
  3. 6. Software attack method to harm or exploit a device or network.
  4. 7. Additional layer of security that verifies a user's access to an account more than once. (Acronym)
Down
  1. 1. Impersonate certain people or job roles like Tech Support or Human Resources to persuade you to release information or perform a dangerous action.
  2. 2. An individual who represents the last line of defense in a world where the threat landscape is constantly changing.
  3. 3. Online platforms that cyber criminals can use to gather information to better target you or your organisation. (Two words)
  4. 4. The address of a webpage which you check the validity of before clicking it. (Acronym)