Infomation Security

12345678910
Across
  1. 1. never click on these from spam email
  2. 6. does damage to, steals information from, or disrupts a computer system
  3. 8. any flaw or weakness that can be exploited
  4. 10. never provide this to anyone via email
Down
  1. 2. assure reliability and accuracy of information and IT resources
  2. 3. unsolicited email
  3. 4. common target for social engineers
  4. 5. examples include credit card fraud, spam and identity theft
  5. 7. use this to create a unique password
  6. 9. type of threat to information security