End Users and Cybersecurity

123456789101112
Across
  1. 2. 85% of people posting puppy photos are trying to _____ you
  2. 3. _____ are connected to the internet
  3. 6. ensure that the correct information is relayed to the right destination across the network
  4. 9. _____ refer to physical items such as devices, consumer products, and gadgets that generate data.
  5. 11. network of connections between people, things, data, and processes
  6. 12. shortened URLs
Down
  1. 1. variant of malware
  2. 4. person who uses IT products or services
  3. 5. occurs when an end user receives an illegitimate message or email
  4. 7. providing education to end users can mitigate cybersecurity _____
  5. 8. almost every employee has access to this
  6. 10. help protect your internet connection and privacy online