Across
- 2. ILoveYou123, 123456, and P@ssw0rd are all this.
- 3. Keeps out most attacks and is both human and machine.
- 5. The amount of systems that should have the same username and password.
- 9. The most effective tool to thwart cyber attacks.
- 12. These employees are part of the information security team.
- 14. It is 100% secure.
- 15. When anything seems strange.
- 16. What to do with sensitive information before sending.
Down
- 1. Software that is designed to do terrible things.
- 4. Weakest link in the security chain.
- 6. Anything suspicious raises these.
- 7. You should only use our computers for this.
- 8. An attempt to get you to let an attacker do their thing.
- 10. A legal source of information that has private material.
- 11. The first step in information security awareness is being about to do this with security threats.
- 13. It's okay to trust, but you should also do this.
