Across
- 4. Unauthorized individuals gaining physical access through closely following authorized personnel
- 7. A form of business risk resulting from cyberattacks or data breache
Down
- 1. Suspicious emails
- 2. Another word for tailgating
- 3. Unexpected behavior exhibited by software applications, such as crashes could be caused by
- 5. Unusual or unrecognizable cables or devices connected to computers, network equipment, or power outlets
- 6. could be physical or virtual including ransomware, phishing, malware, third-party risks, internal risks, vandalism, theft and more.