Across
- 3. This tactic aims to rush you into making decisions without proper thinking time?
- 5. Action you take when receiving a suspicious message
- 6. How soon should you report anything suspicious
Down
- 1. Social engineering technique to obtain confidential information
- 2. Security trust concept built on the stance - never trust/always verify
- 4. Wall that would hurt to run through but protects networks from outside attacks
- 7. Security feature requires multiple forms of authentication
