Across
- 4. A device used to monitor and record activity (6)
- 5. A physical barrier designed to restrict access (7)
- 7. A physical security measure to deter intruders (8)
- 12. A type of lock that requires a key (5)
- 13. A social engineering tactic using urgency or fear (7)
- 14. A person who pretends to be someone else (8)
- 16. A common social engineering tactic involving emails (8)
Down
- 1. A physical security device used to control access (6)
- 2. A physical barrier used to control access (7)
- 3. system A security system that detects unauthorized entry (10)
- 6. Unauthorized access to data (6)
- 8. Unauthorized access by following someone through a secured entryway (2 words)
- 9. A social engineering tactic using flattery or charm (8)
- 10. Deceptive manipulation (8)
- 11. A security measure to protect against fire (7)
- 15. A method of gaining information through deception (12)
