Cybersecurity Puzzle

123456789101112131415
Across
  1. 2. Incidents where confidential information is stolen, leaked, or disclosed are known as what?
  2. 4. A strong culture equals strong _____.
  3. 6. This security feature requires at least two forms of authentication.
  4. 7. The concept of human firewalls is built on this critical aspect of security.
  5. 12. Attackers using manipulative techniques to scam people is known as what?
  6. 14. Organizational ____ are designed to keep people, data, and devices safe.
  7. 15. What is one of the leading causes of security incidents?
Down
  1. 1. This type of fraud occurs when a scammer uses stolen information to open credit cards in the victim’s name.
  2. 3. What is the top attack method for cybercriminals?
  3. 5. This type of malware encrypts data to prevent access to valuable resources.
  4. 6. The umbrella term covering any form of malicious code that alters the functionality of computers and smart devices.
  5. 8. In recent years, attackers have embraced the convenience of these.
  6. 9. While online threats get the most attention in the world of security, these threats pose just as much risk.
  7. 10. People are the last line of ____.
  8. 11. It is imperative to ensure accounts are protected with these.
  9. 13. If you encounter a phishing attack, what should you do immediately?