Across
- 1. never click on these from spam email
- 6. does damage to, steals information from, or disrupts a computer system
- 8. any flaw or weakness that can be exploited
- 10. never provide this to anyone via email
Down
- 2. assure reliability and accuracy of information and IT resources
- 3. unsolicited email
- 4. common target for social engineers
- 5. examples include credit card fraud, spam and identity theft
- 7. use this to create a unique password
- 9. type of threat to information security
