May 2020 Crossword Puzzle

123456789
Across
  1. 3. A list of blocked email addresses.
  2. 4. A cyber-attack method where the cyber attacker leaves a voice mail posing as a legitimate institution to trick targets into calling back and revealing their personal information.
  3. 6. A targeted cybercrime that contacts a target by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
  4. 7. Process of converting plaintext information or data into a ciphertext code to prevent unauthorized access.
  5. 8. Information identifying an individual that if lost, compromised, or disclosed could result in substantial harm, embarrassment, inconvenience, or unfairness to an individual.
  6. 9. Information that can be used to identify an individual alone or with other information.
Down
  1. 1. Information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified.
  2. 2. The fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity via email, telephone, or text message.
  3. 5. A scam in which the criminal takes on the identity of a victim and then attempts to live and act as the stolen identity.
  4. 6. A mobile device-oriented attack where the cyber attacker sends you a text message with a fake link that leads to a malicious website.