Harper Cybersecurity Review

1234567891011121314151617
Across
  1. 4. software we use to protect your laptop
  2. 6. phishing attack thorough voice or phone call
  3. 7. our email filter system
  4. 9. #1 threat to our security
  5. 10. usual media that a phish comes to
  6. 11. type of request that is weird
  7. 14. tactic that a phisher uses
  8. 15. social media site where phisher researches
  9. 16. phishing attack through text message
  10. 17. used in phishing attack called Quishing
Down
  1. 1. where people write the Wifi password
  2. 2. public charging station stealing your info
  3. 3. used for remote access
  4. 5. authentication for VPN access
  5. 8. Information Security is everyone's
  6. 12. 12 or more characters
  7. 13. site where you can scan your own attachments